ev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x7, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x48, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) [ 901.113763] tls_set_device_offload_rx: netdev not found 19:29:53 executing program 1: prlimit64(0xffffffffffffffff, 0x12, 0x0, &(0x7f0000000040)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001440)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000000)=""/29, 0x1d}, {&(0x7f0000000100)=""/215, 0xd7}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)}, {&(0x7f0000001240)=""/78, 0x4e}, {&(0x7f00000012c0)=""/219, 0xdb}], 0x6, 0x0, 0x0, 0x7}, 0x101) getsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000001480)=""/82, &(0x7f0000001500)=0x52) pipe(&(0x7f0000001200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000001580)=0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000015c0)=0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10c013, r0, 0x0) setpgid(r3, r4) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000001540)={0x2, 0x4}) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000001640)=0x7) openat$zero(0xffffffffffffff9c, &(0x7f0000001600)='/dev/zero\x00', 0x400002, 0x0) 19:29:53 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0xfffffffffffffde1, 0x0, &(0x7f0000000140)}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x8, 0x81cda472704b0cc9) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000000c0)=0x36) 19:29:53 executing program 5: r0 = memfd_create(&(0x7f0000000180)='**[+\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000240)={0x0, 0x0, 0x7, 'queue1\x00', 0xffffffffffffff81}) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f00000001c0)={0x3}) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000140), &(0x7f0000000200)=0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x7, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x6f, 0x0, @perf_config_ext, 0x4, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x8}, r1, 0xffffffffffffffff, r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='numa_maps\x00') ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f0000000340)=0x8) syz_mount_image$msdos(&(0x7f0000000600)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe807, 0x1, &(0x7f0000000440)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x10, &(0x7f0000000680)) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000300)) timerfd_create(0x7, 0x7fe) 19:29:53 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e1"}, 0x95) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:29:53 executing program 1: prlimit64(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000140)=""/127) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000080)={0x9, 0x3, 0xfffffffffffffff9, 0x7fff, 0x100, 0x1ff}) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f00000001c0)={0x2, 0x9}, 0x2) inotify_add_watch(r1, &(0x7f0000000200)='./file0\x00', 0x4000011) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x2) ioctl$KDENABIO(r0, 0x4b36) 19:29:53 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x3) 19:29:53 executing program 5: r0 = socket$inet6(0xa, 0x1000000000005, 0xfffffffffffffffd) ioctl(r0, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") getitimer(0x0, 0x0) 19:29:53 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x7, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x57, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:29:53 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e739065182"}, 0x9f) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:29:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x9) syz_emit_ethernet(0x32, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @remote={0xac, 0x30}, @local}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0xfffffffd, 0x5, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2a2201, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {}, {}]}) 19:29:54 executing program 1: prlimit64(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x6, 0x800) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x9001}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, r1, 0x500, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x100}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5d}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x200}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) 19:29:54 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='attr/current\x00') ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000240)=[0x5, 0x3]) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x2b, 0x0, 0x908000000000000, "7266ed588c1c97cbc5724d9afea22668", "1263b6ad1b967c6f4cab0562938171004fd810c58ee7"}, 0x2b, 0x1) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 19:29:54 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x1, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x64, 0x80000000, {"f3403cef2f1bfb03d72936e86790a99e980404d51d5939475960c458216a11a64f9cea3d62eb049c0aa7a386db320ac07d95726002fd7835ad861110b1c92cba349cacd80091db41b6"}}, {0x0, "449a870579c0ec2719f21cb99f7394376be54fb4ad18ca91d977480ba2216728616b4d8ad3dc1628e798ce73e430e2d677ec387c63fe06eb7f9e0578e0b356d528617deb74c9d8f851cc73f045e2cf3fcc5ed5c65e9eda73f317ec4ee033d0780e551a34782e6fcd20a08641d79e30e060697fb98ae7942ac5e9a14f53f33c980c771d324cce1bd3c170e21850ee1e0627ec68e3b96aa220c4e4db0f281c4a8c677c3964ff5d682028f5714c51877cf6d7be4ab1c9722fcb3bc27d91a9aafcbebb0a9f1c04b03e4624494e3df05ace1844eb456f434141c1b55d77bc537551262ce7492b7ce484b379659f57bc0ff794190db247af28732cfe8127d158248920b009799d3f418ea718cc7f96b1989f1d41eddb503964cd38995bac53377494426ec25cd04709549f8d7f85d5b8846d5bb018a4506c66b4c2b64702e6e33a1b738dc5b6e96b3a0078b5a7517d7aa6c08de953169da250c9392685f1e2bed68e4257d886f5962fdaccc8f7c5e9068c138c3f0fb00d6e8a3d6aa9063f757691e9ecbb3cbfee96a2e25398b11f42bdcbfa4318057ad6c53b071766d77cb7debd7e523d0689ebfd7a7d201e8092ef21a7b102a56fe4d7e4cc50f093b4d814e2f1be5ea25a3db88011769efbb4a67aef09ff779e1c56d9fe90c9e33b4dd60e0dfd300f3ba4341bdc9745e78c526ae4cb7d9a7a83815fbdc7876d56fc89dcb62406e32efe6aa0196e858af081f1c163c0874085248732b085a6d23845b1d1836bcff2d9649b4e9fa85bcedfdfe8f89691995f99de7969ff56233b5f600b15f836bb81e5905d9fb5601d2fe07ceae4afbee4ccf6b444e60d965bd246d7d380eb43e6e6042871588f5d8f77e22c423e9156520efa27a68d340d61c1b3431002680a6eb575f88d9a83e985b32403777923a6586761d9f3b922ed9d8e62f29d2afff513a023a495f0ef9f9e3459e3d9c7c29aaefd4ab013cde889d8ee70370ace7322f120c057c0a35d06539a71911af6b0b213d11fc72213c89f153b3b889c04fa6d2ca20cefbc4ea2a71a648a541e6626fc2b0458fca388ee867fb709cc67629301150a02f6bce55f1b30a7954b6ed52d3da1fdbbec491b698c9d50c5b3fe836a0ebd45fb8fc3a43760c4ecf68194eec2de3ae737c5a90a91e0ea1d843c57a54c0ce2c08c8127a4e6e3dbd6b4c5ff62d1072d4f9bf343a54eded44a2e61a3bc3dd348057c002ee2254e2502ea1357693283e30328f203c192f42bc8113dd8967505eb947cbc84"}}, &(0x7f0000000080)=""/128, 0x3e8, 0x80, 0x1}, 0x20) 19:29:54 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x7, 0x2, 'syz1\x00', &(0x7f0000000440)=[']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x36, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:29:54 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02"}, 0xa4) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:29:54 executing program 1: prlimit64(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'nr0\x00', {0x2, 0x4e20, @remote}}) [ 901.840506] dccp_invalid_packet: P.Data Offset(4) too small [ 901.859635] dccp_invalid_packet: P.Data Offset(4) too small 19:29:54 executing program 5: socket$xdp(0x2c, 0x3, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x800, 0x200200) openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x8000, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) ioctl$VT_RELDISP(r0, 0xb701) openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x400000, 0x0) 19:29:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0xa0000, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000000c0)={0x0, 0x11, "6f15a322713d8661c2f13b6e77061b113c"}, &(0x7f0000000100)=0x19) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00', 0x5b, "3873b000e8a0d4ec1edd2fd86086a1782d743393ee1e0e98941a3a636b5036ebeb5592fa8433cee28021224aae01860da8c6da421317421ab50f15f9169be753a762d3b8adb37d7b89227ff465867d05c82139aa8ce21546768b7c"}, &(0x7f0000000240)=0x7f) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r2, 0x4931}, 0x8) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000003000)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) ioctl$KDGKBLED(r3, 0xc0045401, &(0x7f00006d2fff)) [ 901.886794] 9pnet: Insufficient options for proto=fd 19:29:54 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:29:54 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7e, 0x480102) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000004c0)={0x9, 0x5}, 0x4) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/full\x00', 0x80801, 0x0) setsockopt$inet6_tcp_buf(r1, 0x6, 0x3f, &(0x7f0000000600)="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", 0x1000) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000280)={0x0, 0x20, 0xa086, 0x5}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000200)={r2, 0x7}, &(0x7f0000000240)=0x5) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={r3, 0xfe, 0xfc9, 0x6, 0x101, 0x3}, 0x14) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000140), 0x2) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r4, 0x6, 0x2}, 0x8) prlimit64(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000540)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000580)=0x10) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000500)=0x0) fcntl$setown(r1, 0x8, r5) getsockname$inet(r1, &(0x7f0000000180)={0x2, 0x0, @rand_addr}, &(0x7f0000000400)=0x10) ioctl$NBD_CLEAR_QUE(r1, 0xab05) modify_ldt$write(0x1, &(0x7f0000000440)={0xffff, 0x1000, 0xffffffffffffffff, 0x7, 0x7fff, 0x9, 0xfff, 0x100, 0xdbe, 0x2}, 0x10) ioctl$KDSKBLED(r1, 0x4b65, 0x5) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000000300)=""/197) signalfd(r0, &(0x7f0000000480)={0xc8a6}, 0x8) 19:29:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) tee(r0, r0, 0x10000, 0x2) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f0000000240)={0x0, 0x2000000001, 0x2, &(0x7f0000000080)}) 19:29:54 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a4"}, 0xa7) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:29:54 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x406, r0) r1 = fcntl$dupfd(r0, 0x0, r0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000200)) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1, &(0x7f0000000340)) 19:29:54 executing program 2: unshare(0x20000000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x7, 0x80000) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000080)=0x6f80, 0x8) r1 = getuid() ioctl$TUNSETOWNER(r0, 0x400454cc, r1) r2 = socket$vsock_dgram(0x28, 0x2, 0x0) syncfs(r2) 19:29:54 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47e"}, 0xa8) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:29:54 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x84103, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'veth1\x00', 0x400}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x60000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e23, @multicast2}}, 0x8, 0x30000}, &(0x7f00000002c0)=0x90) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000300)={r3}, 0xc) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r4) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/79) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000400)={0xb, 0x10, 0xfa00, {&(0x7f0000000340), r5, 0x10001}}, 0x18) 19:29:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) r2 = memfd_create(&(0x7f00000000c0)="70726f63ae6d696d655f74797065776c616e316e6f64657600", 0x6) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4002000003, 0x1001100005011, r2, 0x0) finit_module(r2, &(0x7f0000000100)="70726f63ae6d696d655f74797065776c616e316e6f64657600", 0x0) 19:29:54 executing program 1: prlimit64(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2004, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000080)) pipe2$9p(&(0x7f0000000000), 0x80000) 19:29:54 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x0, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:29:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1, 0x200000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0xfb, "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"}, &(0x7f00000001c0)=0x103) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000200)={0x3, 0x820a, 0x5, 0x3, r3}, &(0x7f0000000240)=0x10) listen(r0, 0x7) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r4, 0x84, 0x4, &(0x7f0000000000)=0xffffffffffff0001, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendto$inet6(r4, &(0x7f00000007fa)="97", 0x1, 0x0, &(0x7f00006f9000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 19:29:54 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x0, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40ed19afe7e68d1f955e4fe953ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b0400000000000000e14a92bfb826ec8531cb86aec8c73be1c0e402d4423fb2d550390bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1eb664b5a0eb90381e615cfe17473046d3267ee47bb43176cf471157c71e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7c95f54e3f4d376e226541fc2ec7e031e6f30463b0f493e737de5ca1b8efc5bd1faf79d9b5de77aa26c93b385425a49760000a845d7dba0000000000000000000000000000000000000000000000048000000"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:29:54 executing program 1: prlimit64(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x200000, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000140)={0x0, @aes256}) write$P9_RSTATFS(r0, &(0x7f0000000080)={0x43, 0x9, 0x1, {0x101, 0x6, 0x0, 0x6, 0x0, 0x6, 0x9, 0x5, 0xac}}, 0x43) 19:29:54 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x0) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:29:54 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x0, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40edb851afcf8d1f955e4fe153ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b04000000e14a92bfb826ec8565cb86aec8c73be1c0e402d4423fb2d550780bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1ee47bb43176cf471157c73e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7e7246cdfb6c0ab6c183ecedaefd52d3cf4d376e226541fc545d3da94d5c7771422f7ca4db1c36df794c20f88c2ec7e031e6f30463b0f49e5ca1b8efc5bd1faf79d9b5de778a26c93b38542394976000000000000e0434e5d913c3611346592dda845d7dba0080000d7de06a3fdfb61f3247e6fe30c83927f69a28b9c23a0c9ec5388712ab412aba994098b2eca986b4842b4c107fdc2e615a87bc892fc6f9b877e76f472abd8a4555ded1320090126a59426efac6e63bf36e13e38307590d06fdb4922495d4076fe4783e5274dd60812"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:29:54 executing program 0: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000280)=0x3, 0x4) write(r0, &(0x7f0000000600)="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", 0xa00) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8", 0x17f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xff, 0x80}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000240)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0xd0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="1263484002000000000000f103000000000000000000000001000000000000000000000020fb0000000000003800000000000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB="8561646600000000090000000000000003000000000000000000000000000000"], @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="2800000000000000380000000000000018000000000000003800000000000000180000000000000078000000000000001800000000000000"], @ANYBLOB="ff0000000000000008631040", @ANYRES64=r3, @ANYBLOB="020000000000000012634840040000000000000001000000000000000000000010000000000000000000000000000000000000000800000000000000", @ANYPTR=&(0x7f0000000280)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='x\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000e630c400300000003000000000000000c6300000e630c40030000000200000000000000"], 0xcf, 0x0, &(0x7f0000001100)="05fed36d6808ce80cf0465761c161486e953f409871b5c04b972a6c4cc84ed0ceaf6046fb90cd18b4e24d8bbeac9d8a625cb4add7dfdcaac4c67c5bbd9f6e2627ab6e644109f165244360c8b3f49092429bac7b6dab50815a8664cfb7061ba6898d4ec9cb2ca1545d3752f87f6f4d5122dd4ef8e2a6a86f2583181dc4c07e39435befaec7d15f79500351595f3692a4a077621775b922eb7f3c1ac269cbd6c94d246d71e99eb4972bb3055eb8ed2ae47da5a9b62d2080d639426fa52b305255a80dc1783ef7fc19716304244b3b334"}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) write$eventfd(r0, &(0x7f0000000040)=0x8, 0x8) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000140)={0x7b, 0x0, [0x2, 0x4, 0x9, 0xbe]}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000380)={@mcast1, r4}, 0x14) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000000)=0x3) sendfile(r0, r1, 0x0, 0x10000) 19:29:54 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x1000000000000, 0x28040) r1 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x9, 0x101000) fanotify_mark(r1, 0x41, 0x20003, r1, &(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000200)=0x8000, 0x4) 19:29:54 executing program 1: prlimit64(0xffffffffffffffff, 0x7, 0x0, &(0x7f00000000c0)) 19:29:54 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) [ 902.401676] audit: type=1800 audit(1538767794.649:144): pid=32281 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16561 res=0 19:29:54 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0), 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) [ 902.480831] audit: type=1804 audit(1538767794.679:145): pid=32281 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir763904459/syzkaller.6P4UIx/184/file0" dev="sda1" ino=16561 res=1 19:29:54 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x1, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x200, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000280)) prlimit64(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)) mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x2000000, &(0x7f0000000100)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@loose='loose'}, {@posixacl='posixacl'}], [{@obj_type={'obj_type', 0x3d, 'eth1'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@dont_hash='dont_hash'}]}}) 19:29:54 executing program 5: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000100)='net/arp\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_score_adj\x00') syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000003c0), 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f00000001c0)=""/42, 0x2a) sendfile(r2, r1, &(0x7f0000000240)=0x5d, 0x80) [ 902.827546] audit: type=1804 audit(1538767795.069:146): pid=32281 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir763904459/syzkaller.6P4UIx/184/file0" dev="sda1" ino=16561 res=1 19:29:55 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@local}, 0xfd56) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x86) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0x2, &(0x7f0000000240)={&(0x7f0000000100)={0xbc, r2, 0x8ff, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffffe0}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x35}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x56}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5a}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2b}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x16}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x36}}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2a1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x800}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}]}, 0xbc}, 0x1, 0x0, 0x0, 0x840}, 0x24044080) 19:29:55 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}], 0x5, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:29:55 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:29:55 executing program 1: r0 = fcntl$getown(0xffffffffffffffff, 0x9) prlimit64(r0, 0x0, 0x0, &(0x7f0000000040)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={0xffffffffffffff9c, 0x10, &(0x7f0000000540)={&(0x7f0000000500)=""/64, 0x40, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0)=r1, 0x4) rt_sigreturn() truncate(&(0x7f0000000000)='./file0\x00', 0x1) r2 = syz_open_dev$midi(&(0x7f0000000640)='/dev/midi#\x00', 0x401, 0x800) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'irlan0\x00', 0x8002}) truncate(&(0x7f0000000080)='./file0\x00', 0x40) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x802, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000600)=0x3) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x840, 0x0) r5 = inotify_init() lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$sndmidi(&(0x7f0000000940)='/dev/snd/midiC#D#\x00', 0x8000, 0x0) mount$overlay(0x0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='overlay\x00', 0x2000000, &(0x7f0000000840)={[{@nfs_export_off='nfs_export=off'}, {@index_on='index=on'}, {@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@metacopy_on='metacopy=on'}, {@xino_auto='xino=auto'}, {@xino_auto='xino=auto'}, {@nfs_export_off='nfs_export=off'}], [{@fowner_eq={'fowner', 0x3d, r6}}, {@pcr={'pcr', 0x3d, 0x3b}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, r3, &(0x7f0000000140)={r4, r5, 0x3f}) timer_create(0x2, &(0x7f0000000180)={0x0, 0x23, 0x7, @tid=r0}, &(0x7f00000001c0)=0x0) write$UHID_CREATE2(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1ad) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ptrace$getenv(0x4201, r0, 0xfff, &(0x7f00000004c0)) timer_settime(r7, 0x0, &(0x7f0000000240)={{0x77359400}, {r8, r9+10000000}}, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0xc028ae92, &(0x7f0000000480)={0x1, 0x81}) getpid() clock_gettime(0x1, &(0x7f0000000200)) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f00000006c0)={0x8}) 19:29:55 executing program 0: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000280)=0x3, 0x4) write(r0, &(0x7f0000000600)="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", 0xa00) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8", 0x17f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xff, 0x80}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000240)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0xd0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="1263484002000000000000f103000000000000000000000001000000000000000000000020fb0000000000003800000000000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB="8561646600000000090000000000000003000000000000000000000000000000"], @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="2800000000000000380000000000000018000000000000003800000000000000180000000000000078000000000000001800000000000000"], @ANYBLOB="ff0000000000000008631040", @ANYRES64=r3, @ANYBLOB="020000000000000012634840040000000000000001000000000000000000000010000000000000000000000000000000000000000800000000000000", @ANYPTR=&(0x7f0000000280)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='x\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000e630c400300000003000000000000000c6300000e630c40030000000200000000000000"], 0xcf, 0x0, &(0x7f0000001100)="05fed36d6808ce80cf0465761c161486e953f409871b5c04b972a6c4cc84ed0ceaf6046fb90cd18b4e24d8bbeac9d8a625cb4add7dfdcaac4c67c5bbd9f6e2627ab6e644109f165244360c8b3f49092429bac7b6dab50815a8664cfb7061ba6898d4ec9cb2ca1545d3752f87f6f4d5122dd4ef8e2a6a86f2583181dc4c07e39435befaec7d15f79500351595f3692a4a077621775b922eb7f3c1ac269cbd6c94d246d71e99eb4972bb3055eb8ed2ae47da5a9b62d2080d639426fa52b305255a80dc1783ef7fc19716304244b3b334"}) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) write$eventfd(r0, &(0x7f0000000040)=0x8, 0x8) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000140)={0x7b, 0x0, [0x2, 0x4, 0x9, 0xbe]}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000380)={@mcast1, r4}, 0x14) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000000)=0x3) sendfile(r0, r1, 0x0, 0x10000) [ 903.117842] audit: type=1800 audit(1538767795.369:147): pid=32321 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16545 res=0 19:29:55 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000100)={0x43, &(0x7f0000000080)="2b885a339e6cb143e0985d4c26d81ebfc5aee27bbc31f426a3d94ec9460744d4a7521dfa49da46b3bb94d9dd99c24049d5f953f609a7e4f115fe3ca3866464221ed353"}) prlimit64(0xffffffffffffffff, 0xb, 0x0, &(0x7f0000000140)) [ 903.245302] audit: type=1804 audit(1538767795.429:148): pid=32321 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir763904459/syzkaller.6P4UIx/185/file0" dev="sda1" ino=16545 res=1 19:29:55 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000700)=""/162, 0xa2}], 0x5, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40ed19afe7e68d1f955e4fe953ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b0400000000000000e14a92bfb826ec8531cb86aec8c73be1c0e402d4423fb2d550390bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1eb664b5a0eb90381e615cfe17473046d3267ee47bb43176cf471157c71e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7c95f54e3f4d376e226541fc2ec7e031e6f30463b0f493e737de5ca1b8efc5bd1faf79d9b5de77aa26c93b385425a49760000a845d7dba0000000000000000000000000000000000000000000000048000000"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:29:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101100, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[], 0x1f000}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1, 0x5c833, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:29:55 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:29:55 executing program 1: r0 = gettid() r1 = getpgid(0x0) ptrace$getsig(0x4202, r1, 0x4, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) bind(r2, &(0x7f00000000c0)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x80) prlimit64(r0, 0xf, 0x0, &(0x7f0000000040)) 19:29:55 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x5, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:29:56 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="2fd4"]) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x6, 0x100) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000100)) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000080)=[@dstype0={0x6, 0x6}, @efer={0x2, 0x101}], 0x1) shutdown(r2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x1, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) socketpair$unix(0x1, 0x1000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) 19:29:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x6, &(0x7f0000001000)=ANY=[@ANYBLOB="b703000007ffffffc70300000100000027030000020000002703000004000000b7000001000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00'}, 0x48) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x101) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x4) 19:29:56 executing program 1: prlimit64(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)) r0 = request_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)=']%$&*lomd5sumbdev\x00', 0x0) r1 = request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='#(\b\x00', 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f00000001c0)=0x6) keyctl$link(0x8, r0, r1) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000036c0)=[{{&(0x7f0000000240)=@l2, 0x80, &(0x7f0000000400)=[{&(0x7f00000002c0)=""/182, 0xb6}, {&(0x7f0000000380)=""/111, 0x6f}], 0x2, &(0x7f0000000440)=""/130, 0x82, 0x828}, 0xef}, {{&(0x7f0000000500)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000580)}, {&(0x7f00000005c0)=""/48, 0x30}, {&(0x7f0000000600)=""/194, 0xc2}], 0x3, &(0x7f0000000740)=""/4096, 0x1000, 0x1f}, 0x1}, {{&(0x7f0000001740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b00)=[{&(0x7f00000017c0)=""/217, 0xd9}, {&(0x7f00000018c0)=""/124, 0x7c}, {&(0x7f0000001940)=""/238, 0xee}, {&(0x7f0000001a40)=""/165, 0xa5}], 0x4, &(0x7f0000001b40)=""/155, 0x9b, 0xca}, 0x17}, {{&(0x7f0000001c00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001c80)=""/92, 0x5c}, {&(0x7f0000001d00)=""/39, 0x27}, {&(0x7f0000001d40)=""/30, 0x1e}, {&(0x7f0000001d80)=""/125, 0x7d}], 0x4, &(0x7f0000001e40)=""/98, 0x62, 0x8}, 0x40}, {{&(0x7f0000001ec0), 0x80, &(0x7f0000003500)=[{&(0x7f0000001f40)=""/76, 0x4c}, {&(0x7f0000001fc0)=""/77, 0x4d}, {&(0x7f0000002040)=""/129, 0x81}, {&(0x7f0000002100)=""/63, 0x3f}, {&(0x7f0000002140)=""/16, 0x10}, {&(0x7f0000002180)=""/179, 0xb3}, {&(0x7f0000002240)=""/220, 0xdc}, {&(0x7f0000002340)=""/222, 0xde}, {&(0x7f0000002440)=""/191, 0xbf}, {&(0x7f0000002500)=""/4096, 0x1000}], 0xa, &(0x7f00000035c0)=""/242, 0xf2, 0xfffffffffffffffa}, 0x299e}], 0x5, 0x100, &(0x7f0000003800)) connect$packet(r3, &(0x7f0000003840)={0x11, 0x1f, r4, 0x1, 0x1ff}, 0x14) 19:29:56 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x5, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:29:56 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40edb851afcf8d1f955e4fe153ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b04000000e14a92bfb826ec8565cb86aec8c73be1c0e402d4423fb2d550780bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1ee47bb43176cf471157c73e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7e7246cdfb6c0ab6c183ecedaefd52d3cf4d376e226541fc545d3da94d5c7771422f7ca4db1c36df794c20f88c2ec7e031e6f30463b0f49e5ca1b8efc5bd1faf79d9b5de778a26c93b38542394976000000000000e0434e5d913c3611346592dda845d7dba0080000d7de06a3fdfb61f3247e6fe30c83927f69a28b9c23a0c9ec5388712ab412aba994098b2eca986b4842b4c107fdc2e615a87bc892fc6f9b877e76f472abd8a4555ded1320090126a59426efac6e63bf36e13e38307590d06fdb4922495d4076fe4783e5274dd60812"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:29:56 executing program 0: syz_mount_image$erofs(&(0x7f0000000080)='erofs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000580)=ANY=[]) mkdir(&(0x7f0000001700)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001840)=""/145, 0x15) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000200), 0x4) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000001c0)=0xa6) close(r0) 19:29:56 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff0701000100ffffffb702020003000000bf1300000000000085000000999500000000000000ffb96d31875324652a9b89e795ddf53ad1b4a11b62df662ea5d7a521aa81fe7d903c7bcc54fb34a4a9"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0xe, 0x8f, &(0x7f0000000100)="46f1263ab0e2d21caa642b2a88a8", &(0x7f0000000600)=""/143}, 0x28) 19:29:56 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) syz_open_dev$admmidi(&(0x7f0000000340)='/dev/admmidi#\x00', 0x4000, 0x840) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000002c0)={&(0x7f0000ff0000/0xe000)=nil, 0xe000}, &(0x7f0000000300)=0x10) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000100)=@fragment={0x2b, 0x0, 0x9, 0x7fff, 0x0, 0x6, 0x65}, 0x8) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f0000000380)={0x7, 0x9, 0x4, 'queue1\x00', 0x80000004}) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) accept4(r0, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0xc, 0x0) write(r1, &(0x7f0000000180), 0x0) r4 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3, 0x80) ioctl$VHOST_VSOCK_SET_GUEST_CID(r4, 0x4008af60, &(0x7f0000000040)={@hyper}) write$binfmt_misc(r1, &(0x7f00000029c0)=ANY=[], 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)=0xd61d, 0x4) fcntl$getflags(r0, 0x0) [ 904.640532] erofs: read_super, device -> /dev/loop0 [ 904.645758] erofs: options -> [ 904.649482] erofs: cannot find valid erofs superblock 19:29:56 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:29:56 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x5, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) [ 904.726414] erofs: read_super, device -> /dev/loop0 [ 904.741764] erofs: options -> [ 904.755549] erofs: cannot find valid erofs superblock [ 904.781990] overlayfs: filesystem on './file0' not supported as upperdir 19:29:57 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:29:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)) fstat(r0, &(0x7f00000007c0)) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000040)) 19:29:57 executing program 0: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed0000464caeedf840d001fe92b08c3f7b8e1596417d7dcd645413be450000000000000001c122283846253398a04d99ca8680deb20632834bc027c44d4cf3fd102724d6748de61eebb06801048dea7636f3a248a9bf3123882ca9fc66b4e70b06d43045", 0x12e) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x4, 0x9}, 0x14) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x40, &(0x7f0000001fde), 0x4) setsockopt$inet6_buf(r1, 0x29, 0xdf, &(0x7f0000000040)="0ba5d67eb8928f870d1c02730bf32921f0ff2eaf76533685944f58d76e86837d054a2c16f7ff1952c9c3640b4889c252543cfa28dc8cfc89ea93bbc265ad2ed7108bfb851a431933504747b159ab5586eea5cc083f510a8c7b4de3e2c3855006164da47ae548d37b60384328cd39e3fb7b98b63b7851934664cd18ce166ebd47c353550df2313c01f58bace0464d353d84f5931b13", 0x95) [ 904.885852] protocol 88a8 is buggy, dev gre0 19:29:57 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x5, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:29:57 executing program 1: r0 = add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="9e86e242448bbeb6b1ca364ec6250e5f7ae5482df3b46924f605a0ec154ede08d30dfa4a20bb548ede3fde4fcdd39cb85c0e8da10e8d6d6a9b335c0a7109b4937b013d81bf0291069bb4d71862615ef41faf1faf9106019205", 0x59, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, r0) gettid() r1 = syz_open_dev$dmmidi(&(0x7f0000000440)='/dev/dmmidi#\x00', 0x0, 0x8000) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000480), 0x1) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="26f4a3115be2a6621e8c1d0166c12de174932ee4175791fdd8d7e78b0c5f7a1ad5c5878c5b78348184d5448b3d0a426d163744b987782e963943c734183c42c0", 0x40, 0xfffffffffffffff9) r3 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="13a77b15a40954149ea33d35964d4d89cb06604014f0c1b8a5d0d29a56", 0x1d, 0xfffffffffffffffe) keyctl$instantiate(0xc, r2, &(0x7f00000001c0)=ANY=[@ANYBLOB='load ecryptfs trusted:)ceyring\\) 18\x00\b\x00\x004407370955\t487 a7177e\x00'], 0x3d, r3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000000c0)='*\x00', 0xffffffffffffffff}, 0x30) prlimit64(r4, 0x9, 0x0, &(0x7f0000000080)) 19:29:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000780)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x4d, &(0x7f00000002c0)=ANY=[@ANYBLOB="00000000000000000a00000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffea00000000000000000000000000000000000000000000000000000000000000000000000000000000dc5f52a4000000000000000000000000000000000000000000000000000000"], 0x90) close(r2) close(r1) 19:29:57 executing program 2: socketpair$unix(0x1, 0x1000000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000180)="2e2f66692e65318c", 0x0, 0x0) r3 = fanotify_init(0x0, 0x0) fanotify_mark(r3, 0x11, 0x2, r2, &(0x7f0000000380)="2e2f66692e65318c00") r4 = timerfd_create(0x5, 0x80000) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f00000001c0)={0x5, 0x80, 0x6, 0x7}) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000040)}) r5 = creat(&(0x7f0000000200)='./file1\x00', 0x0) write$evdev(r5, &(0x7f0000000000)=[{{0x77359400}, 0x1f}], 0x18) 19:29:57 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40edb851afcf8d1f955e4fe153ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b04000000e14a92bfb826ec8565cb86aec8c73be1c0e402d4423fb2d550780bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1ee47bb43176cf471157c73e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7e7246cdfb6c0ab6c183ecedaefd52d3cf4d3"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:29:57 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40ed19afe7e68d1f955e4fe953ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b0400000000000000e14a92bfb826ec8531cb86aec8c73be1c0e402d4423fb2d550390bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1eb664b5a0eb90381e615cfe17473046d3267ee47bb43176cf471157c71e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7c95f54e3f4d376e226541fc2ec7e031e6f30463b0f493e737de5ca1b8efc5bd1faf79d9b5de77aa26c93b385425a49760000a845d7dba0000000000000000000000000000000000000000000000048000000"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:29:57 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(0xffffffffffffffff) bind$alg(r1, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) accept$alg(r1, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x80000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f00000001c0)=0xc) syz_open_procfs(r3, &(0x7f00000003c0)='io\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001a00)={0x0, @remote, @rand_addr}, &(0x7f0000001a40)=0xc) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000000c0)={r4, @multicast1, @broadcast}, 0xffffffffffffff59) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x4, @dev, 0x4}, 0x1c) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x10000, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x80000, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) 19:29:57 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000180)) r1 = syz_open_pts(r0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000340)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000440)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000a00)={@dev, 0x0}, &(0x7f0000000a40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000b80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000bc0)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f0000000cc0)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000000d00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000d80)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in=@multicast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000f00)={0x0, @remote, @dev}, &(0x7f0000000f40)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000f80)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f0000001080)=0xe8) recvmmsg(0xffffffffffffff9c, &(0x7f0000004440)=[{{&(0x7f0000001980)=@can={0x1d, 0x0}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001a00)=""/67, 0x43}, {&(0x7f0000001a80)=""/65, 0x41}, {&(0x7f0000001b00)=""/255, 0xff}, {&(0x7f0000001c00)=""/173, 0xad}], 0x4, &(0x7f0000001d00)=""/11, 0xb, 0x8}, 0x6}, {{&(0x7f0000001d40)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000002040)=[{&(0x7f0000001dc0)=""/1, 0x1}, {&(0x7f0000001e00)=""/223, 0xdf}, {&(0x7f0000001f00)=""/122, 0x7a}, {&(0x7f0000001f80)=""/153, 0x99}], 0x4, 0x0, 0x0, 0x3}, 0x18}, {{0x0, 0x0, &(0x7f00000043c0)=[{&(0x7f0000002080)=""/4096, 0x1000}, {&(0x7f0000003080)=""/222, 0xde}, {&(0x7f0000003180)=""/146, 0x92}, {&(0x7f0000003240)=""/4096, 0x1000}, {&(0x7f0000004240)=""/247, 0xf7}, {&(0x7f0000004340)=""/66, 0x42}], 0x6, 0x0, 0x0, 0x10001}, 0x2}], 0x3, 0x40000100, &(0x7f0000004500)={0x0, 0x1c9c380}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000004b00)={'team0\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000006200)={@remote, 0x0}, &(0x7f0000006240)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000006280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000062c0)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000006300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006340)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000006380)={'team0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f00000063c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006400)=0x14, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006500)={{{@in6=@loopback, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000006600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f0000006640)={@local, @rand_addr, 0x0}, &(0x7f0000006680)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f00000066c0)={0x11, 0x0, 0x0}, &(0x7f0000006700)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000006780)={0x0, @dev, @loopback}, &(0x7f00000067c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000006800)={'syzkaller0\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1d, &(0x7f0000006840)={@ipv4={[], [], @local}, 0x0}, &(0x7f0000006880)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000068c0)={{{@in6=@ipv4={[], [], @loopback}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f00000069c0)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000007cc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007d40)=0x80) getpeername$packet(0xffffffffffffffff, &(0x7f0000007d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007dc0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007e00)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000008880)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4040000}, 0xc, &(0x7f0000008840)={&(0x7f0000007e40)={0x9cc, r3, 0x320, 0x70bd2b, 0x8, {}, [{{0x8, 0x1, r4}, {0x164, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x400}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x100000000}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0x1f0, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffff00c}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1237}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}]}}, {{0x8, 0x1, r12}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r13}, {0x178, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}]}}, {{0x8, 0x1, r18}, {0xbc, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r19}}}]}}, {{0x8, 0x1, r20}, {0xb4, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r21}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8d00000000000000}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x40}}}]}}, {{0x8, 0x1, r22}, {0xfc, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r25}, {0x108, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r26}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8001}}, {0x8, 0x6, r27}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r28}}, {0x8}}}]}}, {{0x8, 0x1, r29}, {0xf4, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1f}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}, {0x8, 0x6, r30}}}]}}]}, 0x9cc}, 0x1, 0x0, 0x0, 0x4054}, 0x1) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x63b9f67d}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 19:29:57 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x0) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:29:57 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x200000, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x322) prlimit64(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)) getrlimit(0xf, &(0x7f0000000000)) 19:29:57 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) close(0xffffffffffffffff) bind$alg(r1, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) accept$alg(r1, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x80000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f00000001c0)=0xc) syz_open_procfs(r3, &(0x7f00000003c0)='io\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001a00)={0x0, @remote, @rand_addr}, &(0x7f0000001a40)=0xc) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000000c0)={r4, @multicast1, @broadcast}, 0xffffffffffffff59) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x4, @dev, 0x4}, 0x1c) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x10000, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x80000, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) 19:29:57 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40edb851afcf8d1f955e4fe153ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b04000000e14a92bfb826ec8565cb86aec8c73be1c0e402d4423fb2d550780bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1ee47bb43176cf471157c73e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7e7246cdfb6c0ab6c183ecedaefd52d3cf4d376e226541fc545d3da94d5c7771422f7ca4db1c36df794c20f88c2ec7e031e6f30463b0f49e5ca1b8efc5bd1faf79d9b5de778a26c93b38542394976000000000000e0434e5d913c3611346592dda845d7dba0080000d7de06a3fdfb61f324"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:29:57 executing program 1: prlimit64(0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000040)) 19:29:57 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/udp6\x00') ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000200)={0x0, 0x1, {0x21, 0x24, 0xd, 0x5, 0x4, 0x8, 0x2}}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100), 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000003c0)=[@in6={0xa, 0x0, 0x2, @empty, 0x6}, @in6={0xa, 0x4e22, 0x7f, @ipv4, 0x97f}, @in6={0xa, 0x0, 0x0, @local, 0x1}, @in6={0xa, 0x4e22, 0x93, @mcast1, 0x4fa}, @in={0x2, 0x0, @loopback}, @in6={0xa, 0x4e23, 0x5, @ipv4={[], [], @rand_addr=0xff}, 0x6}], 0x9c) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000240)={r2}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)=ANY=[], &(0x7f00000001c0)) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r4, 0x0) write$binfmt_misc(r4, &(0x7f0000000540)=ANY=[@ANYBLOB="000000008e9478f65f2babac217968feb40a5435787ecee6129ad3c8b5e1d60249ef79b59eedc724525ba630b4640150dbcf79b708c3237d7a9335ede076e5e87139eb73e3c65b92c19493e12258a37fc6a1fbf2dc632c8a0b3c11f500000100d27ae4515e351a50dd679d7b2ab1213284b70d83b4041981c1dff1710f970a3162e48cb1e2380ba0d304cbcff2b89d80cda0f80bd400a52548de60e7fac69a757ce20b"], 0x11) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r5, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2000000000000000, 0xd, 0x0, 0x0, r3, &(0x7f0000000000), 0xfffffce4}]) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x0, 0x400) 19:29:57 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000100)) close(r0) [ 905.666752] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! 19:29:58 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:29:58 executing program 1: prlimit64(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xf5c5, 0x40) getsockopt$inet6_dccp_int(r0, 0x21, 0xf, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 19:29:58 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$FICLONE(r0, 0x40049409, r0) 19:29:58 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:29:58 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x0) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:29:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40, 0x0) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000040)) setsockopt(r0, 0x10e, 0x400000000b, &(0x7f0000000000), 0x0) 19:29:58 executing program 1: 19:29:58 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001a0000/0x4000)=nil, 0x4000, 0x0, 0x40031, r1, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x10000000100132, 0xffffffffffffffff, 0x0) select(0x40, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4}, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, &(0x7f0000001280), &(0x7f00000001c0)) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/21, 0x4d0d6200, 0x800}, 0x18) 19:29:58 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:29:58 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) pkey_alloc(0x0, 0x2) pkey_free(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r4 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r4, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r7 = dup2(r5, r5) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000400)={r6, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r7, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r5, 0x402, 0x4) 19:29:58 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x101001, 0x0) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000100)=0x8, &(0x7f0000000140)=0x1) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r2 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = dup3(r0, r2, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) accept$alg(r3, 0x0, 0x0) getsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f00000000c0)=0x73, &(0x7f00000001c0)=0x2) 19:29:58 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x800, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0xffffffffffffffff, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/softnet_stat\x00') dup2(r1, r2) 19:29:58 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x200040, 0x108) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) splice(r0, &(0x7f0000000080), r0, &(0x7f00000000c0), 0x7, 0x8) 19:29:58 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:29:58 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:29:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000100)={0x0, &(0x7f0000000000), 0x0, r2, 0xfffffdfd}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x7fffffff, 0x100000) 19:29:58 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)="80", 0x1}], 0x1, 0x0) 19:29:58 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300), 0x4) clone(0x802102081ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000140)=0xfffffffffffeffff) 19:29:58 executing program 1: prlimit64(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x800000000000001f, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000080)=0x80, 0x4) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f00000000c0)=0x8a, 0x4) 19:29:58 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:29:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x1c, 0x20000032, 0x201, 0x0, 0x0, {}, [@nested={0x8, 0x1, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) fcntl$getown(r1, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000140)='\x00', 0xffffffffffffffff}, 0x30) r3 = fcntl$getown(r1, 0x9) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r4, 0xc058534b, &(0x7f0000000240)={0xdd2, 0x7ff, 0x5, 0x3f, 0xc2d, 0x168c}) prlimit64(r3, 0xfffffffffffffffd, 0x0, &(0x7f0000000040)) 19:29:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) splice(r2, &(0x7f0000000100), r3, &(0x7f0000000140), 0xffffffffffffff00, 0x8) sendmsg$nl_xfrm(r3, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in=@rand_addr}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@loopback}}, &(0x7f0000000300)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x1001, &(0x7f00000003c0)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x20}}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@dont_measure='dont_measure'}, {@context={'context', 0x3d, 'unconfined_u'}}, {@subj_user={'subj_user', 0x3d, "766d6e657431297d7b245c23747275737465645b73797374656d5cc3"}}, {@obj_type={'obj_type', 0x3d, 'em0user.'}}, {@subj_type={'subj_type', 0x3d, 'ecb(cipher_null)\x00'}}]}}) r7 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r7, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) write$P9_RLOCK(r2, &(0x7f00000006c0)={0x8, 0x35, 0x1, 0x1}, 0x8) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f0000000140), 0x4) r8 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vga_arbiter\x00', 0xc0000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r8, 0x80045700, &(0x7f0000000680)) 19:29:58 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40edb851afcf8d1f955e4fe153ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b04000000e14a92bfb826ec8565cb86aec8c73be1c0e402d4423fb2d550780bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1ee47bb43176cf471157c73e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7e7246cdfb6c0ab6c183ecedaefd52d3cf4d376e226541fc545d3da94d5c7771422f7ca4db1c36df794c20f88c2ec7e031e6f30463b0f49e5ca1b8efc5bd1faf79d9b5de778a26c93b38542394976000000000000e0434e5d913c3611346592dda845d7dba0080000d7de06a3fdfb61f3247e6fe30c83927f69a28b9c23a0c9ec5388712ab412aba994098b2eca986b4842b4c107fdc2e615a87bc892fc6f9b877e76f472abd8a4555ded1320090126a59426efac6e63bf36e13e38307590d06fdb4922495d4076fe4783e5"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:29:58 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socketpair$inet(0x2, 0x0, 0xe5, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x5, 0x4) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bind$bt_hci(r0, &(0x7f0000000280), 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x400448ca, &(0x7f0000000000)={'veth1_to_bridge\x00'}) r3 = add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)="5e664cae41da3d078c9b58b2d06ea407df597356463a4a8e8546670fc3a2734aa3330af05dc78f00fe3fc46e02964dabeff4fab6817372193189b245b8938b2173c352faf9c0344b5dc27582621c747357b71f0a8e78e3027505d9ccba2c10947bb00c7608cb4606af1985d82123f287e5790dbbe1930f0c30f70315ca6c6b675a678eaaf699ccc1f74a37fc7372", 0x8e, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r3, 0xa9) [ 906.538931] tc_dump_action: action bad kind 19:29:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001300)={{{@in6=@ipv4={[], [], @multicast2}, @in=@local}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001200)='cpuacct.usage_sys\x00', 0x0, 0x0) write$P9_RATTACH(r1, &(0x7f0000001240)={0x14, 0x69, 0x2, {0x20, 0x2, 0x5}}, 0x14) r2 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$alg(r2, &(0x7f0000005900)=[{0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) chroot(&(0x7f0000001500)='./file0\x00') recvmsg(r2, &(0x7f0000000000)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1, &(0x7f0000fb3fa9)=""/87, 0x251}, 0x0) 19:29:58 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40ed19afe7e68d1f955e4fe953ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b0400000000000000e14a92bfb826ec8531cb86aec8c73be1c0e402d4423fb2d550390bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1eb664b5a0eb90381e615cfe17473046d3267ee47bb43176cf471157c71e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7c95f54e3f4d376e226541fc2ec7e031e6f30463b0f493e737de5ca1b8efc5bd1faf79d9b5de77aa26c93b385425a49760000a845d7dba0000000000000000000000000000000000000000000000048000000"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) [ 906.588478] tc_dump_action: action bad kind 19:29:58 executing program 1: r0 = memfd_create(&(0x7f00000000c0)=']\x00', 0x5) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x9, {0x1, 0x5ad, 0x7ffffffc, 0x200, 0x2, 0x562}}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000580)={0x7ff, 0x6, 0x6, 'queue1\x00', 0x9e}) write$uinput_user_dev(r0, &(0x7f0000000100)={'syz0\x00', {0x200, 0x8, 0x9, 0x6}, 0x4f, [0x10000, 0x1, 0x4, 0x0, 0x401, 0x81, 0x4, 0xffffffffffffff1e, 0x6, 0x8, 0xfffffffffffffff8, 0xfffffffffffffffb, 0x7, 0x877, 0x2, 0x0, 0x80, 0x5, 0x9, 0x5, 0x7, 0x8, 0x1ff, 0x8, 0x2, 0x5623, 0x4, 0x1, 0x5, 0xc, 0x2, 0x4, 0xec7, 0x1, 0xfffffffffffffffb, 0x67, 0x8, 0xffff, 0x2, 0x401, 0x6bf, 0x5, 0x32b, 0x100, 0x4, 0x8e, 0x10001, 0x70, 0x0, 0x81, 0x3, 0x8, 0x0, 0x2, 0xf7, 0x8001, 0x2, 0x8000, 0xfffffffffffffc68, 0x2, 0x2, 0x9, 0x7, 0x6da], [0x1000, 0x3f, 0x4, 0x7ff, 0x200, 0x8, 0x200, 0x400, 0x0, 0x7ff, 0x102d, 0x0, 0x8e, 0x7, 0x3, 0x0, 0x7ff, 0x5, 0x2, 0x8, 0xfffffffffffffffb, 0x14, 0x7, 0x401, 0x6, 0x5, 0x7e, 0xffffffffffff0001, 0x10001, 0x4599, 0x2, 0x0, 0x8, 0x5, 0x0, 0xa6f, 0x1, 0x3, 0x4, 0x401, 0x80000000, 0x6, 0x2, 0x9, 0x9, 0x2, 0xfffffffffffffff9, 0x7, 0x6, 0x80, 0x2, 0xffffffffffff1cc6, 0x9, 0x9, 0x79b9b35f, 0x886d, 0x8, 0xffffffffffff4c40, 0x0, 0x8, 0x0, 0xed0a, 0x0, 0x5], [0x3, 0xfffffffeffffffff, 0xe4dd, 0x98e7, 0xe7f, 0x6, 0xff, 0x9, 0x9, 0x3, 0xa5b, 0x7, 0x401, 0x8001, 0x3f, 0x0, 0x5, 0x44, 0x3f, 0x8, 0x2, 0x4, 0x8, 0x8, 0x10001, 0x7, 0x5, 0x100, 0x3, 0xfffffffffffeffff, 0x5, 0x8001, 0x1, 0x2, 0x80000000, 0x100000000, 0xf, 0x20, 0x20, 0x3ff, 0x1, 0x1, 0x5, 0x6, 0x4, 0x80000001, 0x9, 0x0, 0x9812, 0x81, 0x100, 0x10000, 0x9, 0xb5, 0xf6a3, 0x9, 0x5, 0x2, 0x1, 0x4, 0x2, 0x8, 0x5, 0x8000], [0x4, 0x401, 0xffffffffffffffff, 0x5, 0x8, 0x4, 0x80000000, 0xe0, 0xff, 0xfdb, 0x7fffffff, 0xfd, 0x6, 0x2, 0x3964, 0x1, 0x6, 0x0, 0xffffffffffffff81, 0x6, 0x682, 0x5, 0x1, 0xffffffffffffeba4, 0x2, 0x100000001, 0x1f, 0x8, 0xda, 0x4bd3, 0x3, 0x4, 0x8000, 0x0, 0x2, 0x1, 0x8, 0xd4cf, 0x1, 0x8, 0x2, 0xe89, 0x0, 0x2, 0x2, 0x3f, 0x800, 0x1, 0x8, 0x9, 0x15e, 0xfffffffffffffff8, 0x7, 0x6, 0x2, 0xf1, 0x3, 0x8, 0x4, 0x9, 0x9, 0xffffffffffffffa1, 0x1, 0x200]}, 0x45c) 19:29:58 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40ed19afe7e68d1f955e4fe953ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b0400000000000000e14a92bfb826ec8531cb86aec8c73be1c0e402d4423fb2d550390bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1eb664b5a0eb90381e615cfe17473046d3267ee47bb43176cf471157c71e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7c95f54e3f4d376e226541fc2ec7e031e6f30463b0f493e737de5ca1b8efc5bd1faf79d9b5de77aa26c93b385425a49760000a845d7dba0000000000000000000000000000000000000000000000048000000"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:29:58 executing program 0: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000980)='/dev/urandom\x00', 0x1, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000680)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000700)={&(0x7f0000000640), 0xc, &(0x7f00000006c0)={&(0x7f0000000840)={0xd8, 0x0, 0x0, 0x70bd2d, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fff}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team_slave_0\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bridge\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gretap0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x80000000}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x18}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}]}]}, 0xd8}}, 0x880) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000140)) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) setitimer(0x0, &(0x7f0000000300)={{0x77359400}, {0x0, 0x2710}}, &(0x7f0000000500)) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000800), &(0x7f0000000600)=0xc) socket$packet(0x11, 0x0, 0x300) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000d80)=""/4096) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0e0000000500000000ff1c00"], 0x1) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000580)=ANY=[@ANYRES32]) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000000340)=0xa5) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000540)={@empty, 0x0, r1}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000280)) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240), 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, 0x0, 0x310, 0x0, 0x25dfdbfd}, 0x14}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000d00)={0x0, {0x2, 0x0, @local}, {0x2, 0x4e20, @rand_addr=0x2}, {0x2, 0x4e20, @remote}, 0x0, 0x3ff, 0x0, 0x0, 0x7, &(0x7f0000000a80)='veth0_to_team\x00', 0x1, 0xfffffffffffffffc, 0x2}) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000b80)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x100}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}], [{@context={'context', 0x3d, 'user_u'}}, {@appraise_type='appraise_type=imasig'}, {@smackfshat={'smackfshat', 0x3d, 'fou\x00'}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@euid_lt={'euid<', r2}}, {@smackfstransmute={'smackfstransmute'}}, {@pcr={'pcr', 0x3d, 0x2}}]}}) 19:29:58 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:29:59 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:29:59 executing program 1: prlimit64(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xf}}, {0x2, 0x4e21, @multicast2}, 0x10, 0x4, 0x3d, 0x3, 0x7, &(0x7f00000000c0)='bridge0\x00', 0x5, 0xfffffffffffffa22, 0xffffffffffffffff}) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x37cf, 0x101000) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000080)={0x7fff, 0x7}) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000180)=0x2) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x3118, 0x32, 0xfffffffeffffffff, 0x401, 0x9}) socketpair(0x2, 0x6, 0x8, &(0x7f00000001c0)) 19:29:59 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000180)) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xb) write$P9_RSYMLINK(r0, &(0x7f0000000000)={0x14, 0x11, 0x1, {0x13, 0x3, 0x6}}, 0x14) unshare(0x20000) 19:29:59 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40edb851afcf8d1f955e4fe153ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b04000000e14a92bfb826ec8565cb86aec8c73be1c0e402d4423fb2d550780bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1ee47bb43176cf471157c73e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7e7246cdfb6c0ab6c183ecedaefd52d3cf4d376e226541fc545d3da94d5c7771422f7ca4db1c36df794c20f88c2ec7e031e6f30463b0f49e5ca1b8efc5bd1faf79d9b5de778a26c93b38542394976000000000000e0434e5d913c3611346592dda845d7dba0080000d7de06a3fdfb61f3247e6fe30c83927f69a28b9c23a0c9ec5388712ab412aba994098b2eca986b4842b4c107fdc2e615a87bc892fc6f9b877e76f472abd8a4555ded1320090126a59426efac6e63bf36e13e38307590d06fdb4922495d4076fe4783e5274dd608"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:29:59 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) fcntl$setstatus(r1, 0x4, 0x2800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000180)="bf", 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000698000)=0xe) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x1, 0xff, 0x4, 0x10001, 0xea, 0x9}, &(0x7f0000000080)=0x20) ioctl$TCFLSH(r0, 0x540b, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x400000, 0x0) write$P9_RUNLINKAT(r3, &(0x7f0000000100)={0x7, 0x4d, 0x1}, 0x7) 19:29:59 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) clone(0x0, &(0x7f0000000240), &(0x7f0000001ffc), &(0x7f00000001c0), &(0x7f0000000040)) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r2, 0x40000000af01, &(0x7f0000000380)) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2000, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'lo\x00'}, 0x18) r5 = openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x3) ioctl(r2, 0x800000000008982, &(0x7f00000002c0)) preadv(r2, &(0x7f0000000100)=[{&(0x7f00000005c0)=""/243, 0xf3}], 0x1, 0x0) close(r3) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000001c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000180)={0x0, r3}) times(&(0x7f0000000040)) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x200000000000000f, 0x0) write$cgroup_int(r3, &(0x7f0000000280)=0x2, 0x12) 19:29:59 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)=0x0) prlimit64(r0, 0x0, 0x0, &(0x7f0000000040)) 19:29:59 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) lseek(r0, 0x0, 0x0) 19:29:59 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:29:59 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x80000001, 0x0) r1 = accept(r0, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x80) r3 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x2, 0x80840) ioctl$TIOCCONS(r3, 0x541d) write$nbd(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0xd3) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x9c, {}, 0xffff}, 0xe) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000140)={'vcan0\x00', r2}) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000200)={0x5, 0x0, 0x2000}, 0x4) 19:29:59 executing program 5: sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x5, @local, 0x2000000004}, 0xfffffffffffffe98) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000200)="69726c606e300300d12e312ca85dcb6b") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x400100, 0x0) creat(&(0x7f0000000540)='./file0\x00', 0x108) ioctl$sock_SIOCGIFCONF(r2, 0x8910, &(0x7f0000000980)=@req={0x28, &(0x7f0000000900)={'irlan0\x00', @ifru_addrs=@l2={0x1f, 0x4, {0xfffffffffffffff9, 0x3, 0xf2, 0x7, 0xffffffff, 0x67}, 0x5, 0x7}}}) write$binfmt_misc(r0, &(0x7f0000000640)={'syz0', "061200982d2acd77945689ad8dba54c82d801a190229bd7066331a4c9599b4f5f75d05c0198da6f4e6dae526c7e533e382d9cba60ba6daff0a997d273da273007e408f0d462c50f7183d9f9a4ac99e9790e903d57d41131c8e9275aa09ac75dd8f2313891680d9bdea9ddadf02a9ffca6d6d523ba6ced6177b100c421901eb7d9a5d2c9aff753213ae2c8d3bf89ffd872edbacd217ac5730fe43ba9a46401edd9a4a72fc61990d"}, 0xab) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000440)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000500)={0xa, 0x4, 0xfa00, {r3}}, 0xc) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000004c0)={0xb, 0x10, 0xfa00, {&(0x7f00000002c0), r3, 0x3}}, 0x18) readv(r0, &(0x7f0000000840)=[{&(0x7f0000000700)=""/6, 0x6}, {&(0x7f0000000740)=""/254, 0xfe}], 0x2) r4 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000080)={@mcast1, 0x0, 0x0, 0x3}, 0x20) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}, 0x1}, 0x1c) fcntl$getownex(r1, 0x10, &(0x7f0000000380)={0x0, 0x0}) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f00000008c0)=&(0x7f0000000880)) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000240)="79616d30030300") getsockname(r1, &(0x7f0000002840)=@hci={0x1f, 0x0}, &(0x7f00000000c0)=0x80) perf_event_open(&(0x7f00000003c0)={0x7, 0x70, 0x20, 0x8, 0x6c4e, 0x3, 0x0, 0x6, 0x2, 0x0, 0x56, 0x0, 0x7fff, 0x6, 0x800, 0x1ff, 0x0, 0x1, 0x4, 0x9, 0x3662, 0x2, 0xa44, 0xa86, 0x8, 0x1, 0x7, 0xed, 0x7ff, 0x7, 0xd540, 0xffffffffffffe169, 0x96a, 0x1, 0xa432, 0x2, 0x20, 0x8, 0x0, 0x401, 0x1, @perf_config_ext={0x74f, 0xfffffffffffffffd}, 0x0, 0x2, 0x2, 0x0, 0x0, 0x2, 0x6}, r5, 0x7, r0, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00', 0x0, 0x8}, 0x10) sendmmsg(r1, &(0x7f0000005900)=[{{&(0x7f0000004400)=@xdp={0x2c, 0x4, r6, 0x2f}, 0x80, &(0x7f0000005480)=[{&(0x7f0000004480)="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", 0x1000}], 0x1, &(0x7f00000054c0), 0x0, 0x24000010}, 0x5}], 0x1, 0x0) socket$inet6(0xa, 0x3, 0x80) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000100)="727872b37500", &(0x7f0000000040)="060000006320") 19:29:59 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:29:59 executing program 1: prlimit64(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080), 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x101000, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f0000000100)={0x3, 0x5}) 19:29:59 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:29:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x8, &(0x7f00006c6ff0), 0x0, &(0x7f00009dffb8)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) sendmsg$unix(r2, &(0x7f0000e4ffc8)={&(0x7f0000beb000)=@abs, 0x8, &(0x7f000000d000), 0x0, &(0x7f000053c000)=[@rights={0x18, 0x1, 0x1, [r2]}], 0x18}, 0x0) r4 = socket$inet6(0xa, 0x5, 0x0) ioctl(r4, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") close(r2) close(r1) r5 = fcntl$getown(r0, 0x9) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r5, r6, 0x1, r0, r0) close(r0) 19:29:59 executing program 1: r0 = memfd_create(&(0x7f0000000000)='vboxnet0nodev\x00', 0x1) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)) prlimit64(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0)) 19:29:59 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x2, 0x41fe) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000140)={@in={0x2, 0x4e23}, {&(0x7f0000000080)=""/89, 0x59}, &(0x7f0000000100), 0x400000000000001}, 0xa0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x7fff, 0x3, 0x0, 0x4}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400000, 0x28) prlimit64(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)) 19:30:00 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x22000, 0x0) r1 = fcntl$getown(0xffffffffffffff9c, 0x9) write$P9_RGETLOCK(r0, &(0x7f0000000140)={0x22, 0x37, 0x1, {0x0, 0x3, 0xffffffffffffffff, r1, 0x4, 'proc'}}, 0x22) r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x80) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syncfs(r2) ioctl$KVM_ENABLE_CAP_CPU(r5, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [0x40000003]}) 19:30:00 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, &(0x7f0000002000)}) r2 = dup2(r1, r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000680)={0x54, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0e630c400000000011634840000000000163404000000000000000000000000000000000000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYPTR=&(0x7f0000000240)=ANY=[], @ANYBLOB], 0x0, 0x0, &(0x7f00000006c0)}) 19:30:00 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x80800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r2, &(0x7f00000002c0), 0x10000000000443) 19:30:00 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(0xffffffffffffffff, r9) 19:30:00 executing program 1: r0 = getpid() tgkill(r0, r0, 0x8) prlimit64(r0, 0xf, 0x0, &(0x7f0000000180)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x3, 0x41, 0x400}) getsockopt$inet_udp_int(r1, 0x11, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) 19:30:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)="2f02726f75702e7374617000", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086604, 0x20000001) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f0000000040)) 19:30:00 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) sysfs$3(0x3) prlimit64(0xffffffffffffffff, 0xfffffffffffffffd, 0x0, &(0x7f0000000040)) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xc}}, @in6={0xa, 0x4e24, 0x9, @loopback, 0x20}, @in6={0xa, 0x4e23, 0xffffffff, @mcast2, 0x882}], 0x58) 19:30:00 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:00 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, 0xffffffffffffffff) [ 907.942496] binder: 32687:32689 got reply transaction with no transaction stack [ 907.965551] binder: 32687:32689 transaction failed 29201/-71, size 0-536871616 line 2741 19:30:00 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f00000002c0)=ANY=[]) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000140)='X.z0\x00', 0x1ff) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000080)={{0x0, 0x3, 0x6, 0x3, 0x80}, 0x36, 0x0, 0xffff}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000200)={0x4, @time={r2, r3+30000000}, 0x7, {0x8, 0xb642}, 0x64, 0x2}) 19:30:00 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40, 0x80000) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@mcast1, 0x0, 0x2, 0x1, 0x2, 0x8, 0x7, 0x8}, &(0x7f0000000180)=0x20) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) r3 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x10}, 0x5}, 0x1c) listen(r3, 0x0) 19:30:00 executing program 1: prlimit64(0xffffffffffffffff, 0xb, 0x0, &(0x7f0000000040)) 19:30:00 executing program 0: r0 = memfd_create(&(0x7f00000000c0)="00000ae5fe0000084000", 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='#!\t'], 0x3) write$P9_RCREATE(r0, &(0x7f0000000040)={0x18, 0x73, 0x2, {{0x44, 0x2, 0x7}, 0x10000}}, 0x18) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 19:30:00 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0x200) read$FUSE(r1, &(0x7f00000002c0), 0x1000) fcntl$dupfd(r0, 0x406, r0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f00000000c0), 0x4) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:chkpwd_exec_t:s0\x00', 0x23, 0x2) 19:30:00 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x200, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000280)={"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"}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) ioctl$sock_netdev_private(r1, 0x89fb, &(0x7f0000000200)) ptrace$pokeuser(0x6, r2, 0x1, 0x4) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="7cff00000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) [ 908.112089] binder: undelivered TRANSACTION_ERROR: 29201 19:30:00 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x0, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:00 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x800000000000009) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000040)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000000008000c00eeffffff5d5211c5282d177837d859cf22bc681fdd1ba6c869ada89c56c52cdd1c4a7d7652b804782daa68f12fe8cb9da06bb85e7dc7385e3eebd0d7b7140bc96c9ff1f462baa906c6b8b9fe33320b71bd41601ea2ed2302efb23d6e4bc2249b76c3ca6fb6635f49f543e9fe87f18f5adf91ea5013804710e857131e0e5f3650cee5d69dd6ff325c51f5c1ea97545cdb561132ea583de50694"], 0x1}}, 0x0) 19:30:00 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)) 19:30:00 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x0) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000080)={0x20, 0x7, 0x0, [{0x7ff, 0x3, 0x400, 0x58a, 0x35a2, 0x6, 0x5}, {0x3, 0x4, 0x5, 0x3, 0xfff, 0x8, 0x80000001}, {0x3, 0x0, 0xffffffff, 0x0, 0x7, 0xaae, 0xffffffffffffffeb}, {0x4, 0x6, 0x65ea, 0x7, 0x9, 0x4, 0x2}, {0x20, 0x7ff, 0x1ff, 0x10001, 0x6, 0x8, 0x1000}, {0x0, 0x0, 0x2, 0xcc9, 0x40, 0x800, 0x50d8}, {0x1, 0x9, 0x3, 0x1, 0x4, 0x9839, 0xff}]}) prlimit64(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)) 19:30:00 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x6}]}, 0x10) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendmmsg(r0, &(0x7f0000000040), 0x400000000000086, 0x0) 19:30:00 executing program 0: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 19:30:00 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000040)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) stat(&(0x7f0000000480)='./file0/file0\x00', &(0x7f00000007c0)) creat(&(0x7f0000000240)='./file0/file0\x00', 0x0) 19:30:00 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000140)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, &(0x7f0000000040), &(0x7f0000000080)=[0x38, 0x30, 0x38, 0x0, 0x78, 0x18, 0x0]}}], 0xaf, 0x0, &(0x7f00000001c0)="9845fe57c1d0fa9720a1455931faceebef4633790e08c25774bca1458ab8a54fb6491af09cf57229fbb86b81561275dc6b0b5300980ecdd18f44f1845eca7cea433ec8a0e90c3486fd530b10295223818ae46f0652ebc59bec7160c97091236801a4d733688dff4a64e0c2fe87a8818c16af8776f6f45cd7d1cb95f71db0930f9a09824e4046e14c26c981cdb2f8837f9b0ccb6daff958fdf1f0b57e53abbe34c5d4d54759b1a6c6cd1a23badfc02b"}) 19:30:00 executing program 1: prlimit64(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000000006, 0x0, 0x20000000, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x1, 0x0, 0x0, 0x0, 0x1}, 0x2c) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="330f09000030f6d48d610a5abcb7f9dd3700f974ea6874ba1a855d00e15074f3c28ae197b392ad2da957cf94e537b36e0bb935def394932c3500000000000000000000d3"], &(0x7f00000000c0)='./file0\x00', &(0x7f00005f7ffb)='nfs4\x00', 0x0, &(0x7f000000a000)) modify_ldt$read_default(0x2, &(0x7f0000000140)=""/57, 0x39) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x400, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000100)={0xffffffffffffffae, 0x17, 0x2, {0x7, './file0'}}, 0xfffffffffffffddc) sysfs$2(0x2, 0x9, &(0x7f0000000180)=""/152) msgget$private(0x0, 0x4) prctl$intptr(0x1c, 0x2) 19:30:00 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r4 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r4, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40ed19afe7e68d1f955e4fe953ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b0400000000000000e14a92bfb826ec8531cb86aec8c73be1c0e402d4423fb2d550390bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1eb664b5a0eb90381e615cfe17473046d3267ee47bb43176cf471157c71e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7c95f54e3f4d376e226541fc2ec7e031e6f30463b0f493e737de5ca1b8efc5bd1faf79d9b5de77aa26c93b385425a49760000a845d7dba0000000000000000000000000000000000000000000000048000000"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r7 = dup2(r5, r5) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000400)={r6, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r7, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r5, 0x402, 0x4) 19:30:00 executing program 5: mkdir(&(0x7f0000000140)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000240)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000000c0)='./control/file0\x00') mknod$loop(&(0x7f00000001c0)='./control/file0\x00', 0x0, 0xffffffffffffffff) rmdir(&(0x7f000015dff6)='./control\x00') mkdir(&(0x7f0000000080)='./control/file0\x00', 0x0) close(r0) 19:30:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{&(0x7f0000000b40)=@l2, 0x80, &(0x7f0000000f00), 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="88"], 0x1}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x1000)=nil, &(0x7f0000008ff8)) 19:30:00 executing program 0: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000180)="042900000200000066000000c9030000ec000000010000000200000000000000002000000020000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000002c0)) 19:30:00 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) mknod(&(0x7f0000000040)='./file0\x00', 0x60, 0x0) capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000080)={0x0, 0x1}) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180), &(0x7f0000000240)) 19:30:00 executing program 1: prlimit64(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="eecb9cac3c9d196193add4639ff580981b36920bd5ef907de72f22da94d86b38ddcf4518b4329205daad3b535d0117ac5cfd93008d44678fecba3992a8b1b7369e95e60927c4b53a70f6f9d8674a3de2b03f141cc2", 0x55, r0) 19:30:00 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$IPC_RMID(0x0, 0x0, 0x10) 19:30:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x80a102001ff6, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f, 0x0, 0x0, 0x0, 0x0, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) getsockopt$inet_mreq(r1, 0x0, 0x0, &(0x7f0000000100)={@loopback, @rand_addr}, &(0x7f0000000140)=0x8) 19:30:00 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x0, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) [ 908.496463] EXT4-fs (loop0): Can't read superblock on 2nd try [ 908.573214] EXT4-fs (loop0): Can't read superblock on 2nd try 19:30:00 executing program 1: getpid() r0 = fcntl$getown(0xffffffffffffff9c, 0x9) prlimit64(r0, 0x20000005, 0x0, &(0x7f0000000200)) 19:30:00 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) sendmmsg(r0, &(0x7f0000005a80)=[{{&(0x7f0000001d40)=@sco={0x1f, {0x2}}, 0x80, &(0x7f0000003180), 0x318}}], 0x1, 0x0) 19:30:00 executing program 2: 19:30:00 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x0, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:01 executing program 5: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000240)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="00b4ae9fca19fba868f03158de8d12d04ed14126c514de7b02ade828cb2a0180"}) 19:30:01 executing program 1: r0 = getpgid(0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xded, 0x145000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000840)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe8, 0x100, 0xbb3, {"97a273310a75025379070303c164d5530cc877491391e2bfaf3c686de0737a04632c888b9832635be6344a3bf64bfe08f481abe98b1085a7e3a71ea7343bc73d49fd4ea23f00e2b04e0aad525c5d2984994750e9f786548678fef90bf3e92bc3289e35da873a42cf34369808717ba02d35fc3ff015260f68f2ee3cfc06ac51e40330c92174450ade0eb341af2bd60a9e4f80a5f041777476bd36924ae814e4851f78f0e0f458a1a99d5311a2ef041a6e02817577a01d47db6ceb1f4184a5d92627f998e317e93d0a4edfb7c2d4a1365b1c051454dda02439a0cd0ab2253752f3d7a3a8c313"}}, {0x0, "ae2ceed1de2198e439e4463b0eef6008ff9076b8faa5f53a323c3907d11dd83de9eb78074b2fb606e387"}}, &(0x7f0000000980)=""/195, 0x12c, 0xc3, 0x1}, 0x20) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000180)=@mangle={'mangle\x00', 0x1f, 0x6, 0x650, 0x248, 0x0, 0x248, 0x0, 0x460, 0x580, 0x580, 0x580, 0x580, 0x580, 0x6, &(0x7f0000000080), {[{{@uncond, 0x0, 0xc8, 0x110}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@loopback, @ipv4=@remote, 0xf, 0x18, 0x1}}}, {{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x1c}, [0x0, 0xffffffff, 0xffffffff, 0xffffffff], [0xff, 0xffffffff, 0xffffff00], 'bond_slave_0\x00', 'gretap0\x00', {0xff}, {}, 0x3e, 0x2, 0x2}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@multicast2, @ipv4=@rand_addr=0x8001, 0x40, 0x2d, 0xff}}}, {{@uncond, 0x0, 0xc8, 0x110}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@multicast2, @ipv4, 0xf, 0x2, 0xfda}}}, {{@uncond, 0x0, 0xc8, 0x108}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x9, 0x6, @ipv6=@remote, 0x4e24}}}, {{@ipv6={@empty, @empty, [0xffffff00, 0xffffffff, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xff], 'bond0\x00', 'bond_slave_0\x00', {0xff}, {0xff}, 0x5e, 0x5e7, 0x3, 0x50}, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@inet=@tcp={0x30, 'tcp\x00', 0x0, {0x4e22, 0x4e23, 0x4e23, 0x4e24, 0x13, 0x0, 0x11, 0x8}}]}, @HL={0x28, 'HL\x00', 0x0, {0x2, 0x6}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6b0) r2 = getpgid(r0) getpgid(r2) getpgrp(0x0) r3 = fcntl$getown(0xffffffffffffffff, 0x9) prlimit64(r3, 0x1003, 0x0, &(0x7f0000000140)) r4 = dup(0xffffffffffffff9c) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000000)={'yam0\x00', 0x400}) 19:30:01 executing program 3: 19:30:01 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@loopback, @dev, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}) 19:30:01 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x0, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40ed19afe7e68d1f955e4fe953ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b0400000000000000e14a92bfb826ec8531cb86aec8c73be1c0e402d4423fb2d550390bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1eb664b5a0eb90381e615cfe17473046d3267ee47bb43176cf471157c71e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7c95f54e3f4d376e226541fc2ec7e031e6f30463b0f493e737de5ca1b8efc5bd1faf79d9b5de77aa26c93b385425a49760000a845d7dba0000000000000000000000000000000000000000000000048000000"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)="2e2f6367726f7570000c239fd085acc49b812db3d73d43ea", 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x4bff) io_setup(0x1, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000340)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000200), 0xfffffd07}]) mlockall(0x4) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) 19:30:01 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) sendmmsg(r0, &(0x7f0000005a80)=[{{&(0x7f0000001d40)=@sco={0x1f, {0x2}}, 0x80, &(0x7f0000003180)}}], 0x1, 0x0) 19:30:01 executing program 1: r0 = gettid() prlimit64(r0, 0xd, 0x0, &(0x7f0000000040)) 19:30:01 executing program 2: 19:30:01 executing program 5: 19:30:01 executing program 1: prlimit64(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)) r0 = memfd_create(&(0x7f0000000000)='(]bdev)\x00', 0x5) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000080)={0x6, 0x4, 0x1000, 0x200, 0xfffffffffffffffa, 0x7}) 19:30:01 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40ed19afe7e68d1f955e4fe953ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b0400000000000000e14a92bfb826ec8531cb86aec8c73be1c0e402d4423fb2d550390bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1eb664b5a0eb90381e615cfe17473046d3267ee47bb43176cf471157c71e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7c95f54e3f4d376e226541fc2ec7e031e6f30463b0f493e737de5ca1b8efc5bd1faf79d9b5de77aa26c93b385425a49760000a845d7dba0000000000000000000000000000000000000000000000048000000"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:01 executing program 2: 19:30:01 executing program 5: 19:30:01 executing program 2: 19:30:01 executing program 3: 19:30:01 executing program 0: 19:30:01 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x0, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:01 executing program 1: 19:30:01 executing program 5: 19:30:01 executing program 0: 19:30:01 executing program 2: 19:30:01 executing program 3: 19:30:01 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x0, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:01 executing program 2: 19:30:01 executing program 0: 19:30:01 executing program 1: 19:30:01 executing program 5: 19:30:01 executing program 3: 19:30:01 executing program 1: 19:30:01 executing program 2: 19:30:01 executing program 0: 19:30:01 executing program 5: 19:30:01 executing program 3: 19:30:01 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, 0x0, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r7 = dup2(r5, r5) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000400)={r6, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r7, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r5, 0x402, 0x4) 19:30:01 executing program 0: 19:30:01 executing program 2: 19:30:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000040)={0x400000000002f}) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x3) write$uinput_user_dev(r1, &(0x7f0000000080)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r1, 0x5501) 19:30:01 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000040)) 19:30:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff00009acde1c1140006000000000000000000000000000000000008000500ac14141a080003000100000f010008"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000200)={0x375, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@mcast1, 0x0, 0x0, 0x0, 0x0, 0xbfd5}, 0x20) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[{0x0, 0xc91}], 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:30:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) [ 909.586953] input: syz0 as /devices/virtual/input/input12 19:30:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000000780)={'syz0\x00', {}, 0x0, [0x7], [], [], [0xa7f]}, 0x45c) 19:30:01 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x0, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) [ 909.634273] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 909.646281] input: syz0 as /devices/virtual/input/input13 19:30:01 executing program 5 (fault-call:27 fault-nth:0): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40edb851afcf8d1f955e4fe153ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b04000000e14a92bfb826ec8565cb86aec8c73be1c0e402d4423fb2d550780bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1ee47bb43176cf471157c73e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7e7246cdfb6c0ab6c183ecedaefd52d3cf4d376e226541fc545d3da94d5c7771422f7ca4db1c36df794c20f88c2ec7e031e6f30463b0f49e5ca1b8efc5bd1faf79d9b5de778a26c93b38542394976000000000000e0434e5d913c3611346592dda845d7dba0080000d7de06a3fdfb61f3247e6fe30c83927f69a28b9c23a0c9ec5388712ab412aba994098b2eca986b4842b4c107fdc2e615a87bc892fc6f9b877e76f472abd8a4555ded1320090126a59426efac6e63bf36e13e38307590d06fdb4922495d4076fe4783e5274dd60812"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:01 executing program 2: sendto$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000001000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000580)='/dev/input/mouse#\x00', 0x7, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x10, &(0x7f0000000000)=""/40, &(0x7f00000005c0)=0x28) 19:30:02 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x7, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00'], 0x4d, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) ptrace$getenv(0x4201, r1, 0x100, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x80440, 0x0) truncate(&(0x7f0000000280)='./file0\x00', 0x100007) 19:30:02 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:02 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f00000003c0)=0x5) truncate(&(0x7f0000000400)='./file0\x00', 0x6f4) syz_emit_ethernet(0x6a, &(0x7f0000000040)=ANY=[@ANYBLOB="fff98c7c52adffffffffffff08004500005c0000070000019078acfdffffff1414110306907800000000002f0000ac5c14aa8c141400082c0000204aa68e4090e35cf100ede7d6fb0000e00000010000000000000000020000010000000000000000"], &(0x7f0000000140)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x83, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f00000002c0)={0x7f, 0x3, 0x6, {0x0, 0x989680}, 0x9}) syz_emit_ethernet(0x13c, &(0x7f0000000180)={@dev={[], 0xd}, @broadcast, [{[], {0x8100, 0x1ff, 0x3, 0x3}}], {@ipv6={0x86dd, {0x7fff, 0x6, "ea3772", 0x102, 0x1d, 0x9, @local, @mcast2, {[@hopopts={0x8f, 0x2, [], [@hao={0xc9, 0x10, @ipv4={[], [], @remote}}]}, @fragment={0x2d, 0x0, 0x5, 0xffff, 0x0, 0x1f, 0x66}], @icmpv6=@echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "bf93b81e1f90336b6c30743ca8202a855eb20614f462aa8bc260f962badac466df0552e5b14b2bb5af6a3dab6ad4a683427472f722fdc733a1dfb7c41e2f3eed7fce42ef21b43660238174e4ac8f69fc4531b1b3730a45417243f5e4e12225a9cbec67366897dacb3aa858037695e611b95db2117a03db60c76eb87d00e975e72ad1e1ab4e3907fd474478a9e8aa2b46db4d378e58d037a5159d05f63e3e0a9a2728a424b4cecf55e4008dc4190fce6fd721cfb95141fda53915a9d549e2480049b200665d189e9fdb5cb2138f2057c001f1"}}}}}}, &(0x7f0000000000)={0x1, 0x3, [0x107, 0xa3a, 0x1c6, 0x7cc]}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000340)={0x2f, @multicast2, 0x4e20, 0x4, 'fo\x00', 0x20, 0x1e90, 0x29}, 0x2c) [ 909.944689] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:30:02 executing program 3: mmap(&(0x7f000035d000/0x1000)=nil, 0x1000, 0x200000a, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc1205531, &(0x7f0000000000)) 19:30:02 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x7, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', ')procproc/[\x00'], 0x51, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:02 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x5450, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:02 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x400000002, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x4, 0x0, @tick, {0x5, 0x1}, {0x6}, @time=@tick=0xffffffffffffffff}], 0x30) 19:30:02 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000100)=0xa, 0x4) getsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000b67000), &(0x7f00000000c0)=0x16b) 19:30:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x5, &(0x7f0000000140)=0x0) io_destroy(r0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x4, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) mq_timedreceive(r1, &(0x7f0000000040)=""/94, 0x5e, 0x9, &(0x7f00000000c0)={0x77359400}) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000300)={0x2, 0x0, @dev, [0x0, 0xe00000000000000, 0x0, 0x0, 0x0, 0xfcff000000000000]}, 0x10, &(0x7f0000000480), 0x0, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) [ 910.239274] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:30:02 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8995, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:02 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x7, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x58, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) [ 910.425238] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:30:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:03 executing program 1: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000040)={0x50000000, 0x8449, 0xe}) capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000000000)) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0xc3, 0x4, 0x8, "b879936f5efaf63becd33634e824f24d", "28c8685533e1fa47bf32f78f7ab29e1da4d9f391a55ad347405fa21699abc9c539774317552633aa62f9a2b812199490ac53903cf38d410d6c3144302512e871ed671e97f9ad711136e512fe67bc311d3a034a8591bbe88259d9baaad39ef260612a37c42de6717f67fefb3a038e121051aa080336a315475b6fc9f16b707d7daf17b58fc126d04541c7b59178ed039fe9545906a154fdd92962ba7d9bea6d5832be1730a2e6ccb07d9805c2dab5"}, 0xc3, 0x3) socket$inet_icmp_raw(0x2, 0x3, 0x1) sched_yield() 19:30:03 executing program 3: getpid() r0 = syz_open_dev$admmidi(&(0x7f0000000ac0)='/dev/admmidi#\x00', 0x3ff, 0x80200) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)={0x6, [0x6, 0x3, 0x3, 0x6, 0x5f, 0x0]}, 0x10) ioctl$sock_bt_hci(r0, 0x400448ef, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) sendmsg$kcm(r0, &(0x7f0000000900)={&(0x7f00000001c0)=@xdp={0x2c, 0x6, r1, 0xf}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)="1037e581e4d733ee941ac2642017ac73f20e64bbde30e6bd5eebad2a46b47dd0192a005c964c565bb8b807048fed8c45fbe2c413ed00f0b888713e9fb3f40bab31522e0285ceb9621049c9265afb764002f7767968bc6534a5b7e3790e10b74c5fc6affd793c686f40f32223c194c4b66292b4fed1e3c874e523f5165ef27947f6e5a97509abeec9b821b8a8ee6f719d2eee690e0ccaf8ab5af5301a83e162facb912904d257692067b45e7631cd4ab3c4de0d011b979abbc49f", 0xba}], 0x1, &(0x7f0000000340)=[{0xe8, 0x115, 0x7f, "97e34280e082af7d526e5fea8bdb6cfc5519e29e4f89e7d347aa86dfe785faaf938ff0131f4f245a7c0e8d0abcd8ce469543818d24d95db6ad57d7db9b8fdb6eef323be400270e5fb1e54e1b964b402b95b6975ad651be8387760c9ebb562a04b57d1877b309105953a4fdc7e0c9e28f6897a8aa3efb50bdffcc12e8460e53f18cc7acdb3ab13576fa38a3d1183c01cd0c8627bdb3e747c434534ad18c65fd0d913bcf7c42ec9b3f3ca97ddebdcca34ad7c4c7c8d96ebbac623ab70980a7c5422f461b60dd030c3baf2b1ffdd042ab9d09fa1c2a0f7c"}, {0xf8, 0x100, 0x200, "03a332cd423b4d077264a23a0332d05201f6abfe77d107e06f9e0604559e151b8881586f0fce1782957274afbb8f54cbdcad9fc2ac6ad50eebceaca212cdb3a2df7dc410e8f5fbe025d79468b5c640feec7e02ce50318ff02a2e6248ef079aeeb3b627a5173df46ccf3baf48649c39f2fcf3e853a955405e3a1afe5cc098ca11e23c848223bb65923d2e890aa41b7ef174ffe663eb9e8f6be23c29b23da2354992690696e07c6aaa3ebcf15b439a83cc7adc741cfa6b46aedfba88a84b2b96e8ceeb48d45f5a3ad2990f290172235cf83e651530c0bcb4693d06132a14275c03dfc857b666b3b68f"}, {0x80, 0x104, 0x5, "e6ce54e8af3d8ddd2da4cc89a4bce6d220772686bd8bdc728873dd5970b7c1cb7cb243848e9b13b770dedfa27272c37425b73fc32d339a956d70e9cdc98439109ee04ae857c5fd2c0a7c1f9e85487584849b0f334a98c477fadb769abd28a8d2f900a672e3c08c092aa9ebd2d52e"}, {0x110, 0x10e, 0x682b, "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"}, {0x100, 0x95, 0x6, "086127a221e4650d032f9f99f8c654bcc40fe3ba82aef0c11aa8fb7d4f0510c9d43e7fd5d935937d6ac7b8a87c5ecc61b891740365d628e7ac85cbd445529b8de4566f67173645cb5b35e8091c72ea2ff1c5a51de803f8fd3262bc1d71a586a9f0b285f16ab75745fa57116bb288a38804abe555f8751fe067426e9baa684dd9f61904bdd084f39590b7247f42ec235db220e7ce70cef23f936bd84ee12e66f2d5651bebd00d8930ba57910d643f802d576434b9a81c8bed514587fc365e4059a6787f5b942d084ba3c042d1def029ffe3f364d9b1ffb7bbf7a85f76fdc368b123c5649395b1e41dc1f664"}, {0xe8, 0x100, 0x5, "22f5b93043754787416671a8fe494bd17dd3a2a3cf8b061f90669c54a2482555d6bb79d37decfc691d31d6f39c0ff73b7f7fdbfb3e3a4680c5c4899565e472c96e9dac8e59e06176d02431c5625f0357c4f1e053909857a1023ab0fe3db570725d85347015551892d556de8b04dd31d27837a9f13d1f5df6518dda037d5cb6ac9819757cecd520cd59967c24141214dc58078d3cf67647c24ab94bd5f82ca14ad86d7ce08e9138a8b6bbb743eb92147ef832500c9714a38ad89736c5cf71907409fc0984808d4008ceb0bea9eff1f7179c5afbc3b7"}, {0x10, 0x11a, 0x101}, {0x48, 0x11d, 0xffffffffffffff00, "a1c750ac06c2611324b2d3a350c33d0be29263a3c4bb15cb30ef38684365c8011dfd451d4fad8934f8b9679d280f9dc26438d179"}], 0x5b0}, 0x40) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000980)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000a80)={&(0x7f0000000940), 0xc, &(0x7f0000000a40)={&(0x7f00000009c0)={0x68, r2, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x3}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbb}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7ff}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2c}]}, 0x68}, 0x1, 0x0, 0x0, 0xc800}, 0x4000000) 19:30:03 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x7, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x54, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40ed19afe7e68d1f955e4fe953ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b0400000000000000e14a92bfb826ec8531cb86aec8c73be1c0e402d4423fb2d550390bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1eb664b5a0eb90381e615cfe17473046d3267ee47bb43176cf471157c71e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7c95f54e3f4d376e226541fc2ec7e031e6f30463b0f493e737de5ca1b8efc5bd1faf79d9b5de77aa26c93b385425a49760000a845d7dba0000000000000000000000000000000000000000000000048000000"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:03 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8971, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40edb851afcf8d1f955e4fe153ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b04000000e14a92bfb826ec8565cb86aec8c73be1c0e402d4423fb2d550780bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1ee47bb43176cf471157c73e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7e7246cdfb6c0ab6c183ecedaefd52d3cf4d376e226541fc545d3da94d5c7771422f7ca4db1c36df794c20f88c2ec7e031e6f30463b0f49e5ca1b8efc5bd1faf79d9b5de778a26c93b38542394976000000000000e0434e5d913c3611346592dda845d7dba0080000d7de06a3fdfb61f3247e6fe30c83927f69a28b9c23a0c9ec5388712ab412aba994098b2eca986b4842b4c107fdc2e615a87bc892fc6f9b877e76f472abd8a4555ded1320090126a59426efac6e63bf36e13e38307590d06fdb4922495d4076fe4783e5274dd60812"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) [ 910.784929] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:30:03 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x7, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x50, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15", 0x4) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) io_setup(0x9, &(0x7f0000000000)=0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffff9c, 0x5411, &(0x7f0000000040)) io_submit(r2, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340), 0x87}]) 19:30:03 executing program 3: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x19, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0x12) sendto$unix(r0, &(0x7f0000000040)="d715769b551aa1eba90991b0fc82f02f826f5331142f5f4026785563fb2c604104dc91f9f3907139c354d547ef8cbc3a6305266d1d6723ea66", 0x39, 0x40001, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x6611, 0x0) 19:30:03 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8949, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:03 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x7, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x48, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) [ 910.962686] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:30:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:03 executing program 1: unshare(0x80000012020801) r0 = creat(&(0x7f00000005c0)='./file1\x00', 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x9, 0x582, 0xfffffffffffffffa, 0x4, 0x5}, &(0x7f0000000280)=0x98) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000002c0)={r1, 0x6, 0x20, 0x8, 0x10001}, &(0x7f0000000300)=0x18) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)="3551cd5de31f9ecfe97350c599e969766e35515d9a6d393a5d245dcc170da11336651abe42e2c1ff04000000fbf90f866e8ff8b8cf186302aaee84a1e4de5b6eae81c14924900ab58f371729a8d2c293db06a5622da734604739bbd0e8d6c21fa545896c13c4bf4612f418071f9df9520923ddc978f37ba51477c09f69e58c7a87c3a85bb40d7b9ce604ffbe295102753c11ada3977a29bb4e857f714f47f61e60aa8c6bdb817b48624e7048573878be85ad89fe6db64dfeaf28da1cc1af33173531f856df49b0dd8dfb1f5d38770997a6a409eccc2e641896a3bf160053c0b232da82b2ba5dd251b95db2c6d8fa31bcfb19", 0x1000, &(0x7f0000000100)) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xfffffef6) unlink(&(0x7f0000000040)='./file0\x00') 19:30:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:03 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x2, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x0, 0x0, 0xfffffffffffffffc}) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x101000, 0x9) ioctl$BLKRAGET(r2, 0x1263, &(0x7f00000002c0)) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000480)) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f00000005c0), &(0x7f0000000640)=0x2) write$P9_RXATTRCREATE(r2, &(0x7f0000000300)={0x7, 0x21, 0x2}, 0x7) r3 = socket(0x10, 0x802, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000980)=@sack_info={0x0, 0x800, 0xe86}, &(0x7f00000009c0)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000003c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYBLOB="a600000029010004000000040300000008000000000000000800000000000000ff07002e2f66696c653002000000000100000000000000360b0000000000000307002e2f66696c65308c02000000060000000000000000000000000000000707002e2f66696c65300403000000020000000000000021b1c36eee0000000000000507002e2f66696c6530400400000008000000000000000600000000000000fc07002e2f66696c6530"], 0xa9) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)={r4, 0xa, "ad97b33e11981ae0e52d"}, &(0x7f0000000180)=0x12) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000740)={{{@in=@rand_addr, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000080)=0xe8) ioprio_get$uid(0x3, r5) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000540)={0x10, 0x30, 0xfa00, {&(0x7f0000000400), 0x0, {0xa, 0x0, 0xd90, @dev={0xfe, 0x80, [], 0x16}, 0x6a}, r6}}, 0x38) pipe2$9p(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[{0x3, 0x2}, {0x3, 0x2}, {0x7, 0x7}], 0x3) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x5, 0x10, "4a6dcd57f7f10eae8aa69bdefc837a361ac7469a9ff94cca43026131708220c7fc2c5483bbfa815f2832c3c69eb014b64f25df2c6930c03d7661e3b2d4ed85a3", "8d2f63b66744cc6934c2d68586cdf29fdc2bff8469b8c21f4b8dbe6582ec91a8", [0x0, 0xffffffffffffffc1]}) write$P9_RGETATTR(r7, &(0x7f0000000200)={0xa0}, 0xa0) 19:30:03 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x7, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x57, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40ed19afe7e68d1f955e4fe953ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b0400000000000000e14a92bfb826ec8531cb86aec8c73be1c0e402d4423fb2d550390bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1eb664b5a0eb90381e615cfe17473046d3267ee47bb43176cf471157c71e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7c95f54e3f4d376e226541fc2ec7e031e6f30463b0f493e737de5ca1b8efc5bd1faf79d9b5de77aa26c93b385425a49760000a845d7dba0000000000000000000000000000000000000000000000048000000"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) [ 911.662478] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:30:03 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8914, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:04 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x7, 0x2, 'syz1\x00', &(0x7f0000000440)=[']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x36, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40ed19afe7e68d1f955e4fe953ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b0400000000000000e14a92bfb826ec8531cb86aec8c73be1c0e402d4423fb2d550390bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1eb664b5a0eb90381e615cfe17473046d3267ee47bb43176cf471157c71e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7c95f54e3f4d376e226541fc2ec7e031e6f30463b0f493e737de5ca1b8efc5bd1faf79d9b5de77aa26c93b385425a49760000a845d7dba0000000000000000000000000000000000000000000000048000000"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) [ 911.781361] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:30:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) [ 911.904372] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 912.082873] device team0 entered promiscuous mode [ 912.101640] device team_slave_0 entered promiscuous mode [ 912.120630] device team_slave_1 entered promiscuous mode [ 912.133919] 8021q: adding VLAN 0 to HW filter on device team0 [ 912.148415] device ip6gre0 entered promiscuous mode 19:30:04 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x7, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x57, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:04 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x7, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, "6e2a30456b886bc2165b41fe6900", 'yam0\x00', 'yam0\x00', 'veth1_t/_bond\x00', @link_local, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) [ 912.562809] kernel msg: ebtables bug: please report to author: Wrong nr. of counters requested 19:30:04 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40ed19afe7e68d1f955e4fe953ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b0400000000000000e14a92bfb826ec8531cb86aec8c73be1c0e402d4423fb2d550390bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1eb664b5a0eb90381e615cfe17473046d3267ee47bb43176cf471157c71e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7c95f54e3f4d376e226541fc2ec7e031e6f30463b0f493e737de5ca1b8efc5bd1faf79d9b5de77aa26c93b385425a49760000a845d7dba0000000000000000000000000000000000000000000000048000000"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) [ 912.678828] device team0 left promiscuous mode [ 912.683455] device team_slave_0 left promiscuous mode [ 912.688836] device team_slave_1 left promiscuous mode 19:30:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) [ 912.748796] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:30:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:05 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4000004e23, 0x0, @ipv4}, 0xfffffffffffffdbf) listen(r0, 0x2) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x4000, @dev, [0x0, 0x300000000000000, 0x0, 0x0, 0x4000000]}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x44000, 0x0) r2 = dup3(r1, r0, 0x80000) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000080)) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000040)={0x29, 0x6, 0x0, {0x1}}, 0x29) 19:30:05 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x0, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) [ 912.856034] device team0 entered promiscuous mode [ 912.861300] device team_slave_0 entered promiscuous mode [ 912.873765] device team_slave_1 entered promiscuous mode [ 912.884259] 8021q: adding VLAN 0 to HW filter on device team0 19:30:05 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8946, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40edb851afcf8d1f955e4fe153ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b04000000e14a92bfb826ec8565cb86aec8c73be1c0e402d4423fb2d550780bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1ee47bb43176cf471157c73e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7e7246cdfb6c0ab6c183ecedaefd52d3cf4d376e226541fc545d3da94d5c7771422f7ca4db1c36df794c20f88c2ec7e031e6f30463b0f49e5ca1b8efc5bd1faf79d9b5de778a26c93b38542394976000000000000e0434e5d913c3611346592dda845d7dba0080000d7de06a3fdfb61f3247e6fe30c83927f69a28b9c23a0c9ec5388712ab412aba994098b2eca986b4842b4c107fdc2e615a87bc892fc6f9b877e76f472abd8a4555ded1320090126a59426efac6e63bf36e13e38307590d06fdb4922495d4076fe4783e5274dd60812"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:05 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x9, 0x8000) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@dev, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000880)) geteuid() syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x1000000, &(0x7f0000000900)={[{@creator={'creator', 0x3d, "9817fbdc"}}, {@session={'session', 0x3d, 0x100000001}}, {@iocharset={'iocharset', 0x3d, 'maccyrillic'}}, {@umask={'umask'}}]}) rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)}, 0xff5e, 0x1, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000014c0)) lstat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003e40), &(0x7f0000003e80)=0xc) 19:30:05 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)) llistxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0xc5, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={0x0, @in6={{0xa, 0x0, 0x1000, @mcast1, 0x2cbb23a}}, 0x0, 0x0, 0x8000, 0x2}, &(0x7f0000000340)=0x98) r0 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000100)={'bond0\x00', 0x7f}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000880)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000a40)={&(0x7f0000000600), 0xc, &(0x7f0000000a00)={&(0x7f0000000900)={0x28, 0x0, 0x0, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0xc010}, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000080)={'bond0\x00', 0x1000}) connect$l2tp(0xffffffffffffffff, &(0x7f00000005c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e22, @broadcast}, 0x0, 0x1, 0x4}}, 0x2e) 19:30:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:05 executing program 2: socket$key(0xf, 0x3, 0x2) r0 = socket(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@newtclass={0x44, 0x28, 0x0, 0x70bd26, 0x25dfdbfc, {0x0, r2, {0xfff2, 0xd}, {0xffe0, 0xffe0}, {0xb, 0xfff5}}, [@tclass_kind_options=@c_dsmark={{0xc, 0x1, 'dsmark\x00'}, {0xc, 0x2, @TCA_DSMARK_MASK={0x8, 0x4, 0x3f}}}, @TCA_RATE={0x8, 0x5, {0x100000000, 0x8}}]}, 0x44}, 0x1, 0x0, 0x0, 0x40080}, 0x4000000) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendfile(r0, r3, &(0x7f00000000c0), 0x4000000000000003) 19:30:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:05 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x0, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:05 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0), 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:05 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0xc0045878, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40edb851afcf8d1f955e4fe153ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b04000000e14a92bfb826ec8565cb86aec8c73be1c0e402d4423fb2d550780bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1ee47bb43176cf471157c73e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7e7246cdfb6c0ab6c183ecedaefd52d3cf4d376e226541fc545d3da94d5c7771422f7ca4db1c36df794c20f88c2ec7e031e6f30463b0f49e5ca1b8efc5bd1faf79d9b5de778a26c93b38542394976000000000000e0434e5d913c3611346592dda845d7dba0080000d7de06a3fdfb61f3247e6fe30c83927f69a28b9c23a0c9ec5388712ab412aba994098b2eca986b4842b4c107fdc2e615a87bc892fc6f9b877e76f472abd8a4555ded1320090126a59426efac6e63bf36e13e38307590d06fdb4922495d4076fe4783e5274dd60812"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:gpg_agent_exec_t:s0\x00', 0x26, 0x2) write$cgroup_int(r0, &(0x7f0000000140), 0x3e8) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x7, 0x7000000) 19:30:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4(r0, &(0x7f0000000140)=@generic, &(0x7f0000000040)=0x80, 0x80800) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2800030}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r3, 0x4, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x47}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x2100000000000006, 0x9) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0xff}}}, 0xe8) sendto$inet6(r4, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @local}, 0x1c) r5 = dup3(r1, r1, 0x80000) ioctl$UI_END_FF_ERASE(r5, 0x400c55cb, &(0x7f0000000000)={0x0, 0x3ff, 0x205}) 19:30:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="24100004260001020000000000c28ca1f581ac770247000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x24}}, 0x0) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x4, 0x0) 19:30:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) [ 913.361850] audit: type=1804 audit(1538767805.609:149): pid=686 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name=2F02726F75702E73746170 dev="sda1" ino=16551 res=1 19:30:05 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:05 executing program 3: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x0, 0x0) semop(r1, &(0x7f0000000000)=[{}], 0x1) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000140)=0xb) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) semctl$IPC_RMID(0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x80, 0x0) ioctl$TIOCSETD(r2, 0x5414, &(0x7f0000000280)=0x1d5) socket$inet6(0xa, 0x3, 0x10001) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000480)=""/182) 19:30:05 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x5460, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000680)=0xe8) r2 = socket$inet6(0xa, 0x800, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000006c0)={@broadcast, @local}, 0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x0, 0x0, 0x80, 0xfe}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @dev}]}, &(0x7f0000000400)=0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='scalable\x00', 0x9) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x2, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r3, 0xc008ae05, &(0x7f0000000440)=""/163) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f0000000380)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@dev={0xfe, 0x80, [], 0x18}, @remote, @local, 0x3ff, 0x2, 0x7, 0x500, 0x0, 0x200, r1}) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000700)={{{@in6=@mcast1, @in6=@mcast2, 0x4e23, 0xffffffff80000001, 0x4e22, 0x6, 0xa, 0x80, 0x80, 0xc, r1, r4}, {0x0, 0x5, 0xfffffffffffffb2b, 0x1000, 0x3, 0x0, 0x8, 0x8}, {0x8, 0x90, 0x0, 0x8000}, 0x9e1, 0x6e6bc0, 0x2, 0x0, 0x3, 0x1}, {{@in=@rand_addr, 0x4d2, 0x2b}, 0xa, @in=@loopback, 0x0, 0x0, 0x0, 0x4536, 0x2, 0x2, 0x39e}}, 0xe8) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 19:30:05 executing program 1: r0 = socket$inet6(0xa, 0x800, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x10ad}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xe, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x3bc, &(0x7f00001a7f05)=""/251}, 0x2e) 19:30:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0xfffffffffffffffc, 0x300) getsockopt$packet_buf(r1, 0x107, 0x9, &(0x7f0000651000)=""/240, &(0x7f0000ca5ffc)=0xac) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_persistent(0x16, r2, r3) 19:30:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:05 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x40200, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)="6664696e000000000000000075a2acff65b2381d162691a6a0c346382b82ef73ea22fbe7f461319916db81ef865710a5b4ffb84efce272840000000000000000") preadv(r0, &(0x7f0000000480), 0x10000000000001e1, 0x0) 19:30:05 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x5421, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:06 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:06 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:06 executing program 3: syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='heap,active_logs=2,inline_xattrWshze=0x00000000000003ff,jqfmt=vfsv0,resgid=', @ANYRESHEX=0x0, @ANYBLOB=',\x00']) r0 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000300)={0xffffffffffffff7f, {{0x2, 0x4e20, @multicast2}}, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x20}}}}, 0x108) accept4$inet(r0, &(0x7f0000000140), &(0x7f0000000180)=0x10, 0x80800) 19:30:06 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8942, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) [ 913.980118] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 913.993038] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 914.001813] F2FS-fs (loop3): Unrecognized mount option "inline_xattrWshze=0x00000000000003ff" or missing value [ 914.040396] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 914.049345] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 914.062370] F2FS-fs (loop3): Unrecognized mount option "inline_xattrWshze=0x00000000000003ff" or missing value [ 914.123180] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 914.134698] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 914.142540] F2FS-fs (loop3): Unrecognized mount option "inline_xattrWshze=0x00000000000003ff" or missing value [ 914.153043] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 914.160131] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 914.168210] F2FS-fs (loop3): Unrecognized mount option "inline_xattrWshze=0x00000000000003ff" or missing value 19:30:06 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8afb84f8a906151", 0x20) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfd06) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x100, 0x0) ioctl$SG_GET_VERSION_NUM(r3, 0x2282, &(0x7f00000002c0)) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f00000001c0)=""/205) fsync(r0) recvmmsg(r2, &(0x7f0000001540)=[{{&(0x7f0000000900)=@hci, 0x80, &(0x7f0000000f40)=[{&(0x7f0000002980)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000fc0)=""/93, 0x5d}}], 0x1, 0x0, &(0x7f0000001680)) 19:30:06 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000440)={0x0, 0x80000001, 0x20, 0x80000001, 0x7ff}, &(0x7f0000000480)=0x18) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000004c0)={r1, 0x2}, &(0x7f0000000500)=0x8) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000240)={0x0, 0x4, 0x0, 0x1f, 0x0, 0x800, 0x5}, &(0x7f0000000280)=0x20) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000100)='/dev/nullb0\x00', 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000400)=0x1) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x80004002, 0x0) io_setup(0x20000000000006, &(0x7f0000000180)=0x0) io_submit(r5, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xd, 0x1, 0x0, r4, &(0x7f0000000000), 0xfffffce4}]) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r3, 0x4010ae74, &(0x7f0000000380)={0x7, 0x7ff, 0x2}) recvmmsg(0xffffffffffffffff, &(0x7f0000004e40)=[{{&(0x7f00000002c0)=@sco, 0x80, &(0x7f0000000200)=[{&(0x7f0000000340)=""/12, 0xc}], 0x1}}], 0x1, 0x0, 0x0) 19:30:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:06 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8947, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:06 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:06 executing program 3: clone(0x80000000, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) write$9p(r0, &(0x7f0000000040)="d290ff92e9cf9b04e66c05c71f9e17b258b3b6504996ee6e7d9ed61dbb8d982b01ba5b51dcb313f193ee58f0f5a80c239796c73716ac296ce3d0d7800b008a1ef874a7dd2965ac2074bc58c251adf321cf7538d74e4eca696f3d0a3ce1db", 0x5e) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000100)) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000006a80)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$packet_int(r1, 0x107, 0x13, &(0x7f0000000000), 0x4) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") dup2(r2, r1) 19:30:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:06 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:06 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8937, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:06 executing program 2: pipe2(&(0x7f0000000000), 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x8040) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000180)="206d010000000000000040165867f3dcca9e9c837c86472435e1341769295c0d671d74511590be3e22592b9c01b35476e2a2fb6c6743ca7942dce829e37d3193af879e114a3b486238c7e50ea2091b4570fa50b1aad67551c0eea9f6de15c566f8971cdee54ac5514d37d647fd62b1dbff1d15152746719f54c620b9a732039b44972d1bc3473ff5632ed35a1d3385488a1a7e622b87a5362eb2a342de780f8ceb75122dc7a72ddcdf449482bb04e510d78eb717fbb6f2a46c09a490037e6d110993359d6dde356c289d747cf786d1a6f7147a2c435b0486d8a80261c78006563e5f7d780b319fdbe53310faea4d8844dce000") sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) socket$netlink(0x10, 0x3, 0x6) 19:30:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:07 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40ed19afe7e68d1f955e4fe953ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b0400000000000000e14a92bfb826ec8531cb86aec8c73be1c0e402d4423fb2d550390bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1eb664b5a0eb90381e615c"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:07 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x894a, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:07 executing program 1: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x3, 0x42000) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000200), &(0x7f0000000380)=0x6) r2 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000001600)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) recvfrom$llc(r2, &(0x7f0000000480)=""/4096, 0x1000, 0x0, &(0x7f0000001480)={0x1a, 0x0, 0x1, 0x0, 0x0, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) r3 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x12) semctl$IPC_RMID(0x0, 0x0, 0x0) 19:30:07 executing program 2: socket$xdp(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000200)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000efc700000000000000000000002d8dac146441c65ee7b1d5a3250000000000000000d4ffe1ab00000000000000000000010000000000080000000000000000000000000000000040000000000000000000000000000000000200ee04c79069ffed86a48721a5a22087143badd26ed36b"], 0x78) 19:30:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:07 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40ed19afe7e68d1f955e4fe953ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b0400000000000000e14a92bfb826ec8531cb86aec8c73be1c0e402d4423fb2d550390bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1eb664b5a0eb90381e615cfe17473046d3267ee47bb43176cf471157c71e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7c95f54e3f4d376e226541fc2ec"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:08 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40ed19afe7e68d1f955e4fe953ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b0400000000000000e14a92bfb826ec8531cb86aec8c73be1c0e402d4423fb2d550390bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1eb664b5a0eb90381e615cfe17473046d3267ee47bb43176cf471157c71e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7c95f54e3f4d376e226541fc2ec"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:08 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89a2, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40edb851afcf8d1f955e4fe153ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b04000000e14a92bfb826ec8565cb86aec8c73be1c0e402d4423fb2d550780bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1ee47bb43176cf471157c73e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7e7246cdfb6c0ab6c183ecedaefd52d3cf4d376e226541fc545d3da94d5c7771422f7ca4db1c36df794c20f88c2ec7e031e6f30463b0f49e5ca1b8efc5bd1faf79d9b5de778a26c93b38542394976000000000000e0434e5d913c3611346592dda845d7dba0080000d7de06a3fdfb61f3247e6fe30c83927f69a28b9c23a0c9ec5388712ab412aba994098b2eca986b4842b4c107fdc2e615a87bc892fc6f9b877e76f472abd8a4555ded1320090126a59426efac6e63bf36e13e38307590d06fdb4922495d4076fe4783e5274dd60812"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:08 executing program 2: prctl$void(0x3) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000200)) exit(0x1) r1 = socket$inet(0x15, 0x400000080005, 0x0) bind$inet(r1, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f00000002c0)={"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"}) connect$inet(r1, &(0x7f000001a000)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002500), 0x0, &(0x7f0000024fb8)=ANY=[@ANYBLOB="10000000000002000000000f011dc2bc"], 0x10}, 0x0) 19:30:08 executing program 1: mkdir(&(0x7f0000000080)='./file1\x00', 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000140)='./file0\x00', 0x108, 0x0) renameat2(r0, &(0x7f0000000340)='./file0\x00', r0, &(0x7f0000000380)='./file1\x00', 0x2) unshare(0x2060400) open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) execveat(r0, &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0), &(0x7f0000000400), 0x0) 19:30:08 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40ed19afe7e68d1f955e4fe953ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b0400000000000000e14a92bfb826ec8531cb86aec8c73be1c0e402d4423fb2d550390bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1eb664b5a0eb90381e615cfe17473046d3267ee47bb43176cf471157c71e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7c95f54e3f4d376e226541fc2ec7e031e6f30463b0f493e737de5ca1b8efc5bd1faf79d9b5de77aa26c93b385425a4976"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:08 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:08 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x891d, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:08 executing program 3: r0 = socket$inet6(0xa, 0x802, 0x300000000000000) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 19:30:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3a) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0xf4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000001440)='security.SMACK64\x00', &(0x7f0000001480)='vboxnet0\x00', 0x9, 0x2) getpid() r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x82, 0x0) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000200)=0x5) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) stat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001340)={0xffffffffffffffff, &(0x7f0000000300)="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", &(0x7f0000001300)=""/41}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) socketpair(0x0, 0x0, 0x6, &(0x7f0000000040)) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @loopback, @multicast1}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000280)={{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) fsetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='trusted.overlay.opaque\x00', &(0x7f0000000140)='userposix_acl_access\x00', 0x15, 0x0) 19:30:08 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:08 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8970, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40edb851afcf8d1f955e4fe153ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b04000000e14a92bfb826ec8565cb86aec8c73be1c0e402d4423fb2d550780bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1ee47bb43176cf471157c73e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7e7246cdfb6c0ab6c183ecedaefd52d3cf4d376e226541fc545d3da94d5c7771422f7ca4db1c36df794c20f88c2ec7e031e6f30463b0f49e5ca1b8efc5bd1faf79d9b5de778a26c93b38542394976000000000000e0434e5d913c3611346592dda845d7dba0080000d7de06a3fdfb61f3247e6fe30c83927f69a28b9c23a0c9ec5388712ab412aba994098b2eca986b4842b4c107fdc2e615a87bc892fc6f9b877e76f472abd8a4555ded1320090126a59426efac6e63bf36e13e38307590d06fdb4922495d4076fe4783e5274dd60812"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:08 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000080)) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x80000000, @local, 0x5}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000100)={0x2, 0x0, 0x7, 0x8, 'syz0\x00', 0xffffffff}) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000140)={'security\x00', 0xf1, "9a39662a0cfd38234c68782328600dab61c52cb384532a8bdbbfdc5070e2bef4c075c8889fb8cd8df34dab9bce010a02eee195c0e461f6cf598edd51d283369097036234de209427ce33c09ed154e3c09040dbd7c8ae7ee4b68af3ea57dea5f8ee1cb6516b54c124876a253ba68087b557f037082855163bf9cb41ced1c2b13ba5de37816757e1f3a2681241328bd028bd7b90d34e0eff8f26dedec833f82bf8c92b79edc8b93124a013e7c79f646f984ec36909680aaf610b4e8c790e58ec6fa361098150e2f4daab30e385a12126caed0e9dd03234c64ecb244cd416e2134bdc85f0dad44a721292f2f126ac137a458e"}, &(0x7f0000000280)=0x115) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0x5, 0x30, 0x2, 0x7fffffff}, &(0x7f0000000300)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000340)={r1, 0x0, 0x8, [0x2acb, 0x38, 0x2, 0x4, 0xd16, 0x101, 0x8, 0x6]}, &(0x7f0000000380)=0x18) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000003c0)={r1, 0xeb, "30b3e1bbcec91bab93a2331907d3391dc33c4885d2f9aeaae501f8b119e335ea1f14bfcb3072659829b875ad89f69ed384892eb02606de6f0becc32936371bf2cb5df914965d6cd3b987dec182dcb87e40246971bdfd544379a71f7c9f3500f12a4f2144d8870f35ac3dcc94acb37efe8cb4126be90022cae966086b4c6c3cb6123d76a1c36fec4a4c78d35f8a79388f4c321c24e0102d224db46ff9ca5ec7ce6382275d45fc9e3da4ff75ec90e819bedf0ec17867738f18656176023431163724ea08a11caba846bdb0ea9fa88e8d3033989a6a547a75114fb6b0a1e2c9c987525c1e696a64c68919a0c9"}, &(0x7f00000004c0)=0xf3) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000500)={r1, 0x2}, &(0x7f0000000540)=0x8) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000580)={r0, 0x0, 0x7, 0x100000000, 0xffffffff00000000}) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000600)={0x0, 0x10000, 0x0, &(0x7f00000005c0)=0x7}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000680)={r2, 0x2c, &(0x7f0000000640)=[@in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e24, 0x3f, @mcast2, 0x57}]}, &(0x7f00000006c0)=0x10) truncate(&(0x7f0000000700)='./file0\x00', 0x80000001) r3 = getuid() mount$overlay(0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='overlay\x00', 0x200040, &(0x7f00000007c0)={[{@nfs_export_on='nfs_export=on'}, {@default_permissions='default_permissions'}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@index_off='index=off'}, {@default_permissions='default_permissions'}, {@xino_on='xino=on'}, {@xino_auto='xino=auto'}, {@nfs_export_off='nfs_export=off'}], [{@obj_type={'obj_type', 0x3d, '-]!$GPL'}}, {@fowner_eq={'fowner', 0x3d, r3}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@appraise='appraise'}, {@smackfshat={'smackfshat', 0x3d, 'syz0\x00'}}, {@appraise='appraise'}]}) r4 = socket$pppoe(0x18, 0x1, 0x0) sendto$inet(r0, &(0x7f00000008c0)="044364e585deab82c8481871d972c21c9273ba6272d7921fb875cdfc7bc8dc8bcc5fd2106a969d2b0065cc61b91f9ec1e66699c4edbe4eb96227a7907cfc56b7afc6b443719495e950b2b9b7ffb4c61ea0897c3f890774994ecca0a6c88791792116906b7a95665b2572bf4dd0ffca910aced0668f10599951cf3bbf937c564a60e73ef794", 0x85, 0x8014, &(0x7f0000000980)={0x2, 0x4e21, @multicast1}, 0x10) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f00000009c0)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x1}) ioctl$void(r0, 0xc0045878) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000a00)={r1, 0x2}, &(0x7f0000000a40)=0x8) mknod$loop(&(0x7f0000000a80)='./file0\x00', 0x20, 0x1) fcntl$getown(r0, 0x9) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) fcntl$notify(r4, 0x402, 0x10) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x7, 0x7, 0x0, 0xf, 0x10, 0x10, "119804dd3836dbb30271fc3dab829ade06ceae8ea45d2e17906b68122804a0be5d8aa325e95d1d8aac72e641eb76555f6322b58cb13b8a84ec8c1a3afbb725b2", "5375f7112a202b8fcc2b80168cb171a03e9984576dbc5271ce4f2a0cb638fa08c699f4bfdc13c845101a48bb70b22f5898acf66f39a6245a066feb2a13445e5e", "f796e3210a77a95c392a9b567eb9df4950a909a61aed78ffab80ca9e358ecfa8", [0x3]}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000bc0)={0x10}) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000c00)={0x38c, 0x1, 0x0, [{0x100000001, 0xffff, 0x100000001, 0x3, 0x80000001, 0x10000, 0x100}]}) r5 = add_key(&(0x7f0000000c80)='trusted\x00', &(0x7f0000000cc0)={'syz', 0x1}, &(0x7f0000000d00)="0f802522153dbae5ec40045ae53e61d766ab5484f81922c61ef386abf543679ea7084446a67f6b88849f383fb361f22b6c23ef51f6abf647dd77e306d19ca03f3f1c0a3824d80d1cbe10830493edab5e9e3a79fe8904c0f70f5153e9852efd9baefd1c21ce9733c6ffc02196326707f680e17f5d717e11fad39d00b5a37b11b536a06e84d8f447b78e51af96", 0x8c, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000000dc0)='asymmetric\x00', &(0x7f0000000e00)={'syz', 0x3}, &(0x7f0000000e40)="91b44167", 0x4, 0xfffffffffffffffb) keyctl$negate(0xd, r5, 0x4, r6) 19:30:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="636c6561725f7265667300b04978e60c4ba32fd7b949714bcbe80c57af59747c61a31619cbafea034f5b6bb15332860b9f14c654d1012484f5c9d8edcad2f073e0ca5078fc64d38d1e297b9d66a71452b92cae675696216e08f21e87b8b54da0d1b5f3b4d6f8caf34a15ed2b2c98fcbf581297b31beafaffb76778a196ad93aa3d2d7a06720827") write(0xffffffffffffffff, &(0x7f00004abf1b)="ae", 0x1) ioctl$UI_DEV_CREATE(r0, 0x5501) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='1'], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='statm\x00') sendfile(r0, r1, &(0x7f0000000080), 0x1) 19:30:08 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:08 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:08 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8924, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:09 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000000040)=0x4, 0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000dc6ffe), &(0x7f0000904000)=0x4) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000001c0)=0xe8) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000380)=0x0, &(0x7f00000003c0)=0x0, &(0x7f0000000400)=0x0) r9 = geteuid() lsetxattr$system_posix_acl(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='system.posix_acl_default\x00', &(0x7f0000000880)={{}, {0x1, 0x1}, [{0x2, 0x4, r6}, {0x2, 0x4, r4}, {0x2, 0x3, r8}], {0x4, 0x3}, [{0x8, 0x0, r5}, {0x8, 0x1, r3}, {0x8, 0x7, r3}, {0x8, 0x7, r3}, {0x8, 0x6, r3}, {0x8, 0x4, r3}], {0x10, 0x5}}, 0x6c, 0x1) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f00000005c0)=[0x0, 0xee00, 0xffffffffffffffff]) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r14 = getgid() fstat(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000007c0)={{}, {}, [{0x2, 0x4, r1}, {0x2, 0x3, r2}, {0x2, 0x2, r4}, {0x2, 0x2, r7}, {0x2, 0x5, r9}, {0x2, 0x6, r10}, {0x2, 0x4, r11}], {}, [{0x8, 0x1, r12}, {0x8, 0x2, r13}, {0x8, 0x4, r14}, {0x8, 0x2, r15}, {0x8, 0x2}], {0x10, 0x4}, {0x20, 0x6}}, 0x84, 0x0) 19:30:09 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065060400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b700000059a700009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x200a00, 0x0) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x10, 0x18, &(0x7f0000000000)="5ae02efc441a80536af0d1d96ac723fa", &(0x7f0000000040)=""/24, 0x6414}, 0x28) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") 19:30:09 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8932, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:09 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:09 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x0) socket$unix(0x1, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000100)="4c0000001400197f09004b0101048c590188ffffcf3d34740600d4ff5bffff00e7e5ed7d00000000c8550000000000002758d60034650c0326356cdb47f6aaaa956086cbfe0db35200af4486", 0x4c}], 0x1) 19:30:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:09 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x111000, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @hyper}, 0x10) 19:30:09 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) timer_delete(0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)}}, 0x20) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400add427323b470c458c5602067fffffff81004e220000ac1414aa0b4824ca945f64009400050028925aa80000000000000080000efffeffe809000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 19:30:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040), 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:09 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8993, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000015ff8)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000280)={'team0\x00', r2}) setsockopt$sock_timeval(r0, 0x1, 0x33, &(0x7f0000abaff9)={0x3, 0xfff}, 0x10) 19:30:09 executing program 1: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000440), 0x14) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @mcast1}, 0xffffffffffffff77) listen(r1, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x20, 0x0) r3 = dup2(r2, r2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000340)={0x10001, 0x37c, 0x4, 0x8, 0x7fff, 0x0, 0x7, 0x80000000000, 0x37, 0x4, 0x0, 0x3}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000200)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) ioctl$sock_inet_udp_SIOCOUTQ(r3, 0x5411, &(0x7f00000003c0)) getpgrp(r4) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r2, 0xc0405519, &(0x7f00000001c0)={0x4, 0x2, 0x3, 0x0, 'syz1\x00', 0x8}) socket$can_raw(0x1d, 0x3, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 'syz0\x00'}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000380)={0x9, 0xc3, 0x1f, 0x400, 0x0, 0x6, 0xffffffffffff7fff, 0x8001, 0x8, 0x0, 0x2}, 0xb) init_module(&(0x7f00000002c0)='$$\x00', 0x3, &(0x7f0000000300)="4c65746831812d2900") ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000440)={0x0, 0x6, 0x4, 0x3, 0x1, 0x7}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0xacdbf90f7b4ecd63, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x4, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x10}}}, 0x1c) creat(&(0x7f0000000080)='./bus\x00', 0x0) r6 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) preadv(r5, &(0x7f0000000180)=[{&(0x7f0000000280)=""/248, 0xf8}], 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r0, &(0x7f00000001c0)={0x10000000}) gettid() 19:30:09 executing program 2: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x42040, 0x0) sendto$inet6(r0, &(0x7f0000000140)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0xfffffffffffffda6, 0x40010, &(0x7f0000000080)={0xa, 0x4e24, 0xffffffffffffffff, @ipv4={[], [], @loopback}, 0xb00a}, 0x1c) open_by_handle_at(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="10c7700bed09c528bb82a7cdfd85"], 0x0) 19:30:09 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@hci, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000600)=""/219, 0xdb}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000000)=0xffff, 0x134) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x5, 0x4) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f00000000c0)=0xff, 0x4) sendto$inet6(r0, &(0x7f0000000300), 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) truncate(&(0x7f0000000080)='./file0\x00', 0x101) 19:30:09 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8910, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040), 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:09 executing program 3: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") fsetxattr$security_capability(r0, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v2={0x2000000, [{0x40, 0x8}, {0x1ff, 0x3}]}, 0x14, 0x1) r1 = socket$kcm(0x29, 0x2, 0x0) unshare(0x400) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) getsockopt$sock_linger(r1, 0x1, 0x31, &(0x7f0000000400), &(0x7f0000000440)=0x8) [ 917.204720] audit: type=1804 audit(1538767809.449:150): pid=975 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir998179359/syzkaller.SiFUvl/1904/bus" dev="sda1" ino=16565 res=1 19:30:09 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x0, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x807}, 0x1c) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x100, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x0, 0x4) sendmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="3f020000000000002900000003000000e10984fa3279d7a9e03a22b169d736c06ab11a96f7d25adf9166e34ba01ef80187324065bcda06ab9013268169230973698dc95dde627650790df783841dcbb38ed04b54d5375b9d6a0000001839aa24"], 0x60}, 0x1}], 0x1, 0x0) 19:30:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000180)={0x7fff}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000140)=ANY=[@ANYBLOB="2c4921bea3"], &(0x7f0000000380)=0x1) r2 = getpgrp(0x0) fcntl$setown(r0, 0x8, r2) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000040)={0x32, 0x6, 0x0, {0x3, 0x0, 0x9, 0x0, '/dev/kvm\x00'}}, 0x32) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240), &(0x7f00000002c0)="76b5017af8a5bdd9fcc0f3c520698755ad0ec2fe9dda8b3cf77efb536e1c84dd8a387f63ac2ab3ef250c6fd39f60f6131c3becfa6a25459a6de2db8b3d1a6abb4fcadbb077412e1d466a4110c2be9358154b332ef884c7b2d185409eaa7e53faf94d", 0x0, 0x62}) r4 = syz_open_procfs(r2, &(0x7f00000001c0)='net/rt6_stats\x00') ioctl$EVIOCSABS0(r4, 0x401845c0, &(0x7f0000000200)={0x6b, 0xfff, 0x6, 0x6ff8, 0xacec0, 0x1}) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 917.267300] audit: type=1804 audit(1538767809.509:151): pid=1003 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir998179359/syzkaller.SiFUvl/1904/bus" dev="sda1" ino=16565 res=1 19:30:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040), 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) [ 917.298519] audit: type=1804 audit(1538767809.509:152): pid=1004 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir998179359/syzkaller.SiFUvl/1904/bus" dev="sda1" ino=16565 res=1 19:30:09 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x80000000, 0x6, [0xffffffffffffffff, 0x0, 0x7931, 0x100000001, 0x2, 0x7]}, &(0x7f0000000040)=0x14) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r2, 0x7, 0x2, [0x8, 0x8001]}, &(0x7f00000000c0)=0xc) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000140)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) socket$inet6(0xa, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='smaps_rollup\x00') setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r3, 0x114, 0xa, &(0x7f00000002c0)={0x2, "bd38"}, 0x3) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r5, &(0x7f0000000a40)=ANY=[@ANYBLOB='\x00'], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r5, r5, &(0x7f00000000c0), 0x8080fffffffe) getpeername(r0, &(0x7f0000000100)=@pppol2tpv3, &(0x7f0000000180)=0x80) mkdirat(r4, &(0x7f0000000200)='./file1\x00', 0x88) 19:30:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x3, 0x80000000000009, 0x1}, 0x2c) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000000140)="e3584d8dd64616c1193376c50f8200cb26586268bf5f8906467a7f3147bf93e0bb9e471521785d05821cb74b5f6e78b38b7bf3aa0f6a70ac7be501c31874c1120305475a6b26114f0227", 0x4a) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000240)}, 0x20) r2 = dup2(r0, r0) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000000)={0x2, 0x8, [{0xffffffff7fffffff}, {0x9, 0x0, 0xa9e}]}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f00000003c0)="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"}, 0x3f8) 19:30:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:09 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8922, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:09 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$getflags(r0, 0x40a) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x2f, 'rdma'}, {0x2d, 'memory'}, {0x2d, 'memory'}, {0x2f, 'pids'}, {0x2b, 'pids'}, {0x2b, 'memory'}]}, 0x2a) 19:30:09 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(0xffffffffffffffff, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) [ 917.481891] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 19:30:09 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000180)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)=0x7b) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) 19:30:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:09 executing program 1: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) symlink(&(0x7f0000000280)='.\x00', &(0x7f0000000240)='./file0\x00') umount2(&(0x7f0000000080)='./file0\x00', 0x2) chown(&(0x7f0000000040)='./file0/../file0/file0\x00', 0x0, 0x0) 19:30:09 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8911, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40edb851afcf8d1f955e4fe153ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b04000000e14a92bfb826ec8565cb86aec8c73be1c0e402d4423fb2d550780bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1ee47bb43176cf471157c73e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7e7246cdfb6c0ab6c183ecedaefd52d3cf4d376e226541fc545d3da94d5c7771422f7ca4db1c36df794c20f88c2ec7e031e6f30463b0f49e5ca1b8efc5bd1faf79d9b5de778a26c93b38542394976000000000000e0434e5d913c3611346592dda845d7dba0080000d7de06a3fdfb61f3247e6fe30c83927f69a28b9c23a0c9ec5388712ab412aba994098b2eca986b4842b4c107fdc2e615a87bc892fc6f9b877e76f472abd8a4555ded1320090126a59426efac6e63bf36e13e38307590d06fdb4922495d4076fe4783e5274dd60812"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x2, &(0x7f0000001180)=[{&(0x7f00000000c0)="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", 0x1000, 0x8}, {&(0x7f00000010c0)="041ef90b3629928c497d8c72346bc3c9e796631755650b47d16b81a141d102b2b858131fad7ab009cdc4f45f701fe62267b2bedcc6fc4208e3890ee4b920e0566989c2e3076daac5c59c852a951569d3c067b3d8bd7b001aaab31baf84d4d7f67d862a6d4336204be10911dfedf4ca59104f932de732341b404a27c49f6fba543220b76cba4350055c380aa8c4674b508c02183ba509e8edd87f4145b413985a56da4e5f350b4ba3cc14", 0xaa, 0x7ff}], 0x0, &(0x7f00000011c0)={[{@gqnoenforce='gqnoenforce'}], [{@obj_type={'obj_type', 0x3d, "2676626f786e65743029252b7b76626f786e6574315dd9776c616e316d643573756d24707070316574683073656c696e75785b657468312a"}}, {@dont_measure='dont_measure'}]}) syz_emit_ethernet(0x2a, &(0x7f00006ba000)=ANY=[@ANYBLOB="ffffffffffff509db42a0589080045000013000000000f00907800000000ffffffff00009078e0000001"], &(0x7f0000000040)) 19:30:09 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, 0xffffffffffffffff) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) [ 918.245682] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 918.288779] overlayfs: filesystem on './file0' not supported as upperdir 19:30:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair(0x4, 0x80005, 0x2, &(0x7f0000000000)) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000002640)=@ipv6_newroute={0x24, 0x18, 0x9, 0x0, 0x0, {}, [@RTA_ENCAP={0x8, 0x16, @typed={0x4, 0x4, @binary}}]}, 0x24}}, 0x0) 19:30:10 executing program 1: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x5, &(0x7f0000000600)=[{&(0x7f0000000280)="172297512fa20842e2b0040df063b80e0735ef7e0e8ed73dff83184f1718087b545c990214a95ab63d6d98717061a6c13e45fe45324af2effea32b142d0777bf24278e51fa52236cd43fa6299e308ee02c8f8c5e3b0434d2cf8efd045f4fe822d2deb3d386869c36eb2e9052c3171caaa8822e28ded1610fae4a5c024c917deb1189b049f40e7cd95792af613093220702df44", 0x93, 0x9}, {&(0x7f0000000340)="83561e9e0b5d2ed421f094d0d9d4902ce1583fcc0bafa0d8d33bfcb7d78649524935dd7e75d4e0cf99774105b5a86788fb1f493bde63812761b31814ac4ae5baa588b3653ecbdc73fa8994912249e7b162823726573a8bf6f96d15713734ffd5026074289db6c4b9cf4b35f850837d134c1da355291577", 0x77, 0xfffffffffffffffa}, {&(0x7f00000003c0)="3b10c8f272b49d06fc644a5086edac6dbd867748211da49e1901251659b8f97c9b91aa2f73351420494d70be17b9542f0abd35271692258294abd50093fabc3fe2099144fbfe277e4b201275437fad294d8277bf0ce19e9f4444c9e6c5be69f11ef79fdb47304e42cff24fa6cc7fd280d0", 0x71, 0xfffffffffffffffb}, {&(0x7f0000000440)="bc9f6b9644f217b7875292b11e2172926cbc98207b4acde4eb428f152335bba90e5854fe5edf4f5b3384584dc8d0b9682035ca9453f0c0f476652a0495e8c85a578cb2e20e44af2c6b5bbab132ee869f620937626d6a59923f4349ff620abeffdd260e429f6a41b802ccd1fd7f2e697fe667b349789c0690c007cfa7fa89cd8e0bb99b3a32d31ee30956c562499ac1c4b73416c39c6103a53e8c75aee241121a0d54a4ebdcbf5621a5984c3f7b7edb819896c790de51b3a47b0c8b3f1da4d80839c3fcc6bc99", 0xc6, 0x2}, {&(0x7f0000000540)="aa4819e6db7708d5dc6c44f0faf4fd09065c6dca2ea14c817e30419c998fc78736fb38475973407cfbd6898f680081086e944114249a98bb7e76ace5ffcac25c9e7c1a18b7f18e021932bde0268321924ab0fef0a8c0ccf34ad9cae84a917837f5136e7d95dff035490ddfaef79b74f77053e790ff062ba3023b1cf6c3f6a8efa67178a44c9a2fbb66d75e8d9befdcb835ceca91eef9041c3ae1dde85ee2555c90dfe0ef72f7e7162f", 0xa9, 0x5}], 0x400, &(0x7f0000000680)={[{@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x4800000000000000}}, {@noacl='noacl'}, {@noacl='noacl'}], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@fsuuid={'fsuuid', 0x3d, {[0x7f, 0x99087e48dffa9b90, 0x31, 0x65, 0xe46048bfc498a101, 0x37], 0x2d, [0x61, 0x35, 0x37, 0x77], 0x2d, [0x36, 0x77, 0x3d, 0x61], 0x2d, [0x77, 0x32, 0xf3c262b57b4f3ae3, 0x65], 0x2d, [0x62, 0x63, 0x67, 0x37, 0x65, 0x39, 0x31, 0x67]}}}]}) r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc0045540, &(0x7f0000000100)) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x200000000000003, 0x2) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000080)=0x6, 0x4) 19:30:10 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x891e, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40edb851afcf8d1f955e4fe153ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b04000000e14a92bfb826ec8565cb86aec8c73be1c0e402d4423fb2d550780bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1ee47bb43176cf471157c73e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7e7246cdfb6c0ab6c183ecedaefd52d3cf4d376e226541fc545d3da94d5c7771422f7ca4db1c36df794c20f88c2ec7e031e6f30463b0f49e5ca1b8efc5bd1faf79d9b5de778a26c93b38542394976000000000000e0434e5d913c3611346592dda845d7dba0080000d7de06a3fdfb61f3247e6fe30c83927f69a28b9c23a0c9ec5388712ab412aba994098b2eca986b4842b4c107fdc2e615a87bc892fc6f9b877e76f472abd8a4555ded1320090126a59426efac6e63bf36e13e38307590d06fdb4922495d4076fe4783e5274dd60812"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:10 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x40000000015, 0x5, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x280040, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xf, 0xfffffffeffffffff, 0x0, 0x4, 0x6, r2, 0x6}, 0x2c) bind$inet6(r1, &(0x7f0000000100)={0xa, 0xffffffffffffffff, 0x10000000000000, @dev={0xfe, 0x80, [0x2]}, 0x5d0b}, 0x1c) 19:30:10 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) [ 918.402057] erofs: read_super, device -> /dev/loop1 [ 918.407270] erofs: options -> user_xattr,fault_injection=0x4800000000000000,noacl,noacl,mask=^MAY_WRITE,fsuuid=1e7 [ 918.423466] RDS: rds_bind could not find a transport for fe80:200::, load rds_tcp or rds_rdma? 19:30:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) [ 918.447902] erofs: cannot find valid erofs superblock 19:30:10 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000000)={'bpq0\x00', {0x2, 0x0, @multicast2}}) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x4) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) fstat(r1, &(0x7f0000000600)) socket$inet6(0xa, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) write$tun(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="286db4276c7501ab5fbcff"], 0x1) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) close(r4) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000005c0)=0x5, 0x4) setgid(0x0) r5 = accept4(r2, 0x0, &(0x7f0000000040), 0x0) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x10000000) syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x200000) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)="fb4e86afeb1182dc09620a8f9acfc488f5de179e99202af92c2685e437eb63ec82eb7f6d039292ebd7bf4eed865917c56564af59a96bb55d3ff4dc058565963aba31a1c1a9bf9f8470f53dae0bc2e791587e5145593ced6bee57b07584d02007e41656f825fbe032029955463265ff0b85b6e29632aa3f87f56df348809a908e0385a5dcdbe8b8032563383309682c907f673ee442f7ead02ae5bbea78c93f9cc5c6e10ae4843af9727e19a659854d59d606ca8f988e19f7782b3028ea33d713f29c2cfe241a36446ae5a8f7be950e86f01041a88b878fa906f15a55e6", 0xdd, 0xfffffffffffffffd) r6 = add_key(&(0x7f0000000480)='rxrpc\x00', &(0x7f00000004c0)={'syz', 0x2}, &(0x7f0000000500)="339411e828910459776ab24f9081d077868035adae3b02ea115886d23373604c11b601f8207e8ffc7a3cd8e0321073fa79b7fc40a38775d222766b931780b95091a0b7fbaa57ec361616a2051254de51764915ac976f0a5c3a7dc567b756b6dcfc362dad2d12a87dc4065000416111bba5c8bfe9e8f2ac5539eeac26fa36fe429fc84d858cf06d13d297dd7522f6baff0c6e4ef3895d726fc7f453e337098a438e7d4bcb35426d8927073177cfc2", 0xae, 0xfffffffffffffffb) keyctl$unlink(0x9, 0x0, r6) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000240)) dup3(r0, r5, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000400)={0x0, 0x0, 0x40}, &(0x7f0000000440)=0x14) 19:30:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) pipe2(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f00000003c0)) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x44050}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000125bd7000ffdbdf25020000006800030014000600ff020000000000000000000000000001080004000400000014000600ff0200000000000000000000000000010800010002000000080001000300000014000600ff010000000000000000000000000001080004000700000008000800020000000c000300080001000200000018000300140006000000000000000000000000000000000008000500d403000008000500ffff0000"], 0xb0}, 0x1, 0x0, 0x0, 0x4000}, 0x40) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000200)=@v3={0x3000000, [{0x5}, {0x8, 0x3}], r3}, 0x18, 0x1) 19:30:10 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote}, &(0x7f0000000200)=0x14) r7 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={0x0, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r7, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:10 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8933, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:10 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000140)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r1, &(0x7f0000000280)="df", 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x2, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) fchmod(r1, 0x193) 19:30:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x1, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101080, 0x0) write$eventfd(r3, &(0x7f0000000040)=0x1, 0x8) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) dup3(r1, r2, 0x0) r4 = request_key(&(0x7f0000000100)='blacklist\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='/dev/mixer\x00', 0xfffffffffffffffe) keyctl$describe(0x6, r4, &(0x7f00000002c0)=""/4096, 0x1000) 19:30:11 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:11 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x891f, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) pipe2(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f00000003c0)) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x44050}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000125bd7000ffdbdf25020000006800030014000600ff020000000000000000000000000001080004000400000014000600ff0200000000000000000000000000010800010002000000080001000300000014000600ff010000000000000000000000000001080004000700000008000800020000000c000300080001000200000018000300140006000000000000000000000000000000000008000500d403000008000500ffff0000"], 0xb0}, 0x1, 0x0, 0x0, 0x4000}, 0x40) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000200)=@v3={0x3000000, [{0x5}, {0x8, 0x3}], r3}, 0x18, 0x1) 19:30:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:11 executing program 2: r0 = socket$inet6(0xa, 0x804, 0x1000) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") clone(0x84007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() mknod(&(0x7f0000000340)='./file0\x00', 0x10001040, 0x0) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)) ptrace(0x4206, r1) r2 = gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000040)) tkill(r2, 0x15) tkill(r1, 0x14) 19:30:11 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8948, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="13"]) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[]) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000380)='overlay\x00', 0x2, &(0x7f0000000580)={[{@lowerdir={'lowerdir', 0x3d, './file1'}}, {@xino_off='xino=off'}, {@lowerdir={'lowerdir', 0x3d, './file0/file0'}}, {@xino_off='xino=off'}, {@nfs_export_off='nfs_export=off'}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@index_on='index=on'}], [{@context={'context', 0x3d, 'system_u'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@euid_lt={'euid<', r0}}]}) prctl$setmm(0x23, 0x7, &(0x7f0000ffc000/0x3000)=nil) msgget(0xffffffffffffffff, 0x4) mount$overlay(0x404000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="75707065726469723d2e7765ff0f0000000000006c6530989ad0e56b6469723d2e2f0400000000000000ae87bf11468550f1feaf3f48c68cee8a1d96c8bb3d43df1b48fb350d0f9ebb01b1fc223b55bf08b5be0da99f3da01d96979b23b470a6a4a103a9e8f3dc3916846160fb36039aebb93f5354bbe12e3ae803222c5469df3592cfa2ecbd3a8967377ab540ad5dfb5f171ab080dd05fa106ddf65d9decf3198e3b54ab6a170f3392e28a625bc718ca9b2c52307ec9c43a1859d32f4e827f48fe023a6b58af1ef7f3a1fd088701f5684f7b06e25078234f6bf1cddb58dcb08dbc3"]) lsetxattr$trusted_overlay_upper(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0xb9, 0x4, 0x401, "b2b36ebfa95e34f5d270deaa120f81b1", "d69930aff76e7f0b473a577c556ad2cf860475d0b80da904bd0f799585e6099de5f85391fe853341e059ae29b8e348f602be29b40717b1f0abfa9e87b8821733a5a0d5453ac343de85d1004e192578b11b75b8adac29ac9992c19fbddafd8ee7ea336cf15462649abdfa6116fb1326b44ef10e44fdb9cfcd4ee49d19ae042b99fab6c89a8eb41d52865fd820413e5b2ec741891c35864418140a0b2a76b61f408d887c81"}, 0xb9, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x8, 0x400) openat$cgroup_subtree(r1, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) 19:30:11 executing program 3: socket$key(0xf, 0x3, 0x2) socket(0x10, 0x2, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7, 0x4000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f00000000c0)={0x3, 0x7fffffff, 0x1, 'queue0\x00', 0xe33a}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000040), 0x4000000000000003) 19:30:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:11 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(0xffffffffffffffff, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:12 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x0, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:12 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89b1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) [ 919.806972] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 919.825213] overlayfs: unrecognized mount option "context=system_u" or missing value 19:30:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:12 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x260001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip6_mr_vif\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x10000000400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={"00000000000000ff00", 0x2003}) fcntl$setsig(r1, 0xa, 0x3e) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)) ioctl$TUNSETOWNER(r1, 0x400454cc, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x1d) [ 919.862645] overlayfs: missing 'lowerdir' 19:30:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) [ 919.909212] overlayfs: unrecognized mount option "context=system_u" or missing value [ 919.909824] overlayfs: missing 'lowerdir' 19:30:15 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40000, 0x0) ioctl$TCSBRK(r0, 0x5409, 0x55) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x20001, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e20}}, 0xde9, 0x20}, &(0x7f0000000000)=0x90) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={r2, 0x5}, &(0x7f0000000100)=0x8) close(r1) getpeername$packet(r0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x14) r4 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000004c0)={{0x1, 0x7, 0x8, 0x7, '\x00', 0xfffffffffffffffd}, 0x5, 0x30000100, 0x6, r4, 0x8, 0xfd, 'syz1\x00', &(0x7f0000000440)=['net/ip6_mr_vif\x00', '/dev/ptmx\x00', 'net/ip6_mr_vif\x00', '/dev/ptmx\x00', '/dev/ptmx\x00', '/dev/ptmx\x00', '/dev/zero\x00', "707070306e6f646576e227276d696d655f74797065657468313a47504c6c6f766d6e65743000"], 0x76, [], [0x100, 0x3, 0x80, 0xfffffffffffff801]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000180)=0x0) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f0000000400)={0x2, r0, 0x1}) r6 = syz_open_procfs(r5, &(0x7f0000000140)='net/ip6_mr_vif\x00') getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000280)={r3, 0x1000, 0x7, [0x6, 0x1, 0xffff, 0x0, 0x7, 0x80, 0xfffffffffffffffc]}, &(0x7f00000002c0)=0x16) write(r0, &(0x7f0000000300)="5df76e1277be597286868e8e3ab9ebdbe2e738c35b6608", 0x17) fcntl$notify(r6, 0x402, 0x400000000000031) exit(0x0) fchown(r6, 0x0, 0x0) 19:30:15 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x0, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:15 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8929, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)="262a1e00"}, 0x10) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000240)) r1 = getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x1, 0x2000, 0x8, 0x0, 0xfffffffffffffffc, 0x0, 0x367, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x18000000, 0x7, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x81}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x1ffffffffffd, 0x0) openat$cgroup_ro(r0, &(0x7f0000000440)='cpuacct.usage_all\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)=@in6={0xa, 0x4e23, 0x0, @dev}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}, 0x0, 0x100000000, 0x4, 0x0, 0xfffffffffffffff7}, 0x0, 0x5, 0xffffffffffffffff, 0x0) socketpair(0x8, 0x80005, 0x17b3, &(0x7f00000000c0)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) r2 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x3, 0x100000001, 0x0, 0x1, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x3f, 0x8f, 0x0, 0x0, 0x400, 0x4, 0xfffffffffffffffb, 0x20, 0x7fffffff, 0x34, 0x0, 0xfc, 0x81, 0x10001, 0x6, 0x528, 0x0, 0x209, 0x9, 0xb9, 0x0, 0x2, 0x0, 0x0, 0x3, @perf_bp, 0xc0, 0x5, 0x101, 0x1, 0x80, 0x1, 0x8021}, r1, 0xe, 0xffffffffffffffff, 0x9) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000002e40)={0x12, 0xf0, 0x4, 0x6c, 0x0, 0x1}, 0x2c) syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x9, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r3, &(0x7f00000001c0), &(0x7f0000000140)}, 0x20) write$cgroup_type(r0, &(0x7f0000000640)='threaded\x00', 0x9) recvmsg(r2, &(0x7f0000012c40)={&(0x7f00000124c0)=@can, 0x80, &(0x7f0000012b00)=[{&(0x7f0000012600)=""/226, 0xe2}, {&(0x7f00000128c0)=""/65, 0x41}, {&(0x7f0000012980)=""/188, 0xbc}], 0x3, &(0x7f0000012bc0)=""/80, 0x50}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000012c80)={0x0, 0x0, &(0x7f00000001c0)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x24, &(0x7f0000000080)=""/36}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002d80)={r3, &(0x7f00000004c0), &(0x7f0000000540)=""/182}, 0x18) 19:30:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:15 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast1, @in6=@local}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002680)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000026c0)={0x0, 0x0, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x81, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc}, 0x48) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000280)={r0, 0xffffffffbc5d4557, 0x8, "8232ed7fb39d33be76dbd91bb5e8a2614c0a6d6c50825cbbd29976a92be600ceccba3a27c4622388904500fd9b1699b6a26bd3f21a1fb192b49e36241c832f4814b1eff206d51fec413e29d0887c0e0fe0c7b08439f6120e129f3ff647c5c9b9411ed5cc37bc569f75c3b9d6b27ebe3273214aa89701d7865f59033f2f670129"}) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040), 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000100), 0x4) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x0, 0x4) r3 = shmget(0x2, 0x3000, 0x54000041, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_INFO(r3, 0x3, &(0x7f0000000400)=""/214) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="030000000000000000000000000000000200000000000000020000000000000000000000300000003f00007300000000070000000000000000000000000000000000000000000000000100000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000"]) sendmmsg(r4, &(0x7f0000005fc0), 0x800000000000059, 0x0) 19:30:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) [ 922.789903] net_ratelimit: 5 callbacks suppressed [ 922.789930] Dead loop on virtual device ip6_vti0, fix it urgently! 19:30:15 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8992, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:15 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local}, 0x1c) fcntl$notify(r6, 0x402, 0x4) [ 922.841413] Dead loop on virtual device ip6_vti0, fix it urgently! [ 922.863543] Dead loop on virtual device ip6_vti0, fix it urgently! [ 922.874802] Dead loop on virtual device ip6_vti0, fix it urgently! 19:30:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)="262a1e00"}, 0x10) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000240)) r1 = getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x1, 0x2000, 0x8, 0x0, 0xfffffffffffffffc, 0x0, 0x367, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x18000000, 0x7, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x81}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x1ffffffffffd, 0x0) openat$cgroup_ro(r0, &(0x7f0000000440)='cpuacct.usage_all\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)=@in6={0xa, 0x4e23, 0x0, @dev}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}, 0x0, 0x100000000, 0x4, 0x0, 0xfffffffffffffff7}, 0x0, 0x5, 0xffffffffffffffff, 0x0) socketpair(0x8, 0x80005, 0x17b3, &(0x7f00000000c0)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) r2 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x3, 0x100000001, 0x0, 0x1, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x3f, 0x8f, 0x0, 0x0, 0x400, 0x4, 0xfffffffffffffffb, 0x20, 0x7fffffff, 0x34, 0x0, 0xfc, 0x81, 0x10001, 0x6, 0x528, 0x0, 0x209, 0x9, 0xb9, 0x0, 0x2, 0x0, 0x0, 0x3, @perf_bp, 0xc0, 0x5, 0x101, 0x1, 0x80, 0x1, 0x8021}, r1, 0xe, 0xffffffffffffffff, 0x9) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000002e40)={0x12, 0xf0, 0x4, 0x6c, 0x0, 0x1}, 0x2c) syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x9, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r3, &(0x7f00000001c0), &(0x7f0000000140)}, 0x20) write$cgroup_type(r0, &(0x7f0000000640)='threaded\x00', 0x9) recvmsg(r2, &(0x7f0000012c40)={&(0x7f00000124c0)=@can, 0x80, &(0x7f0000012b00)=[{&(0x7f0000012600)=""/226, 0xe2}, {&(0x7f00000128c0)=""/65, 0x41}, {&(0x7f0000012980)=""/188, 0xbc}], 0x3, &(0x7f0000012bc0)=""/80, 0x50}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000012c80)={0x0, 0x0, &(0x7f00000001c0)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x24, &(0x7f0000000080)=""/36}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002d80)={r3, &(0x7f00000004c0), &(0x7f0000000540)=""/182}, 0x18) [ 922.883310] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 922.908853] Dead loop on virtual device ip6_vti0, fix it urgently! [ 922.927493] Dead loop on virtual device ip6_vti0, fix it urgently! 19:30:15 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8994, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) [ 922.996308] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:30:15 executing program 2: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x20000, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x200000000000, 0x1810, r0, 0x0) write$tun(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="c45d0c07833b36f13911771c8199c4dc0700842005954d674c"], 0x1) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x10, 0x3, 0x2e38}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={r2, 0x6}, &(0x7f0000000140)=0x8) finit_module(r1, &(0x7f0000000240)='^:user\x00', 0x3) 19:30:15 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(0xffffffffffffffff, 0x402, 0x4) 19:30:15 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x200031) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000180)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @broadcast}}}, 0x108) 19:30:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:15 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f2, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) signalfd(r0, &(0x7f0000000080)={0x4}, 0x8) r2 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x46e, 0x400002) r3 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000480)={{0xfffffffffffffffe, 0x2, 0x9, 0x2, 'syz0\x00', 0x2}, 0x3, 0x30, 0x8, r3, 0x4, 0x6d2eb2bd, 'syz0\x00', &(0x7f0000000400)=['/proc/sys/net/ipv4/vs/drop_entry\x00', 'port1\x00', '[--\x00', '/proc/sys/net/ipv4/vs/drop_entry\x00'], 0x4c, [], [0x1, 0x0, 0x3, 0xfffffffffffffffa]}) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) close(r4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x894c, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x5}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0xc0189436, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r6, 0x40a85321, &(0x7f0000000300)={{0xffffffff, 0xfffffffffffff3f5}, 'port1\x00', 0x25, 0x40008, 0x3, 0x5, 0x3, 0x80000001, 0x100000001, 0x0, 0x0, 0x10000}) 19:30:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) clone(0x64200000, 0x0, 0xfffffffffffffffe, &(0x7f0000000540), 0xffffffffffffffff) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000500)={'lo\x00'}) pipe2(&(0x7f0000000400)={0xffffffffffffffff}, 0x0) read$eventfd(r1, &(0x7f0000000000), 0x285) 19:30:16 executing program 1: r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x804000000000000, 0x0, 0x8, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000cd1000/0x4000)=nil, 0x4000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) [ 923.717565] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:30:16 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x0) 19:30:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$dspn(&(0x7f00000008c0)='/dev/dsp#\x00', 0x7ff, 0x4081) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000b00)={0x4, 0x7, 0x8a8, 0x20debbf5, &(0x7f0000000940)=[{}, {}, {}, {}, {}, {}, {}]}) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r3, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x6000, 0x0) sendmsg$key(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)={0x2, 0x6, 0xb94, 0x9, 0xd, 0x0, 0x70bd29, 0x25dfdbfe, [@sadb_x_sec_ctx={0xb, 0x18, 0x6, 0x0, 0x4c, "124889673ca8209fad9445476f6619115aea9bd95ad33ca9588c0401358b76d9f85318526e32486cfdb343bac9c6126d749de25438bfb1e03fabcd8c83ab279bcf5b10d7d2949fc48c39e98a"}]}, 0x68}}, 0x50) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$P9_RREADDIR(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e36666d6c6530"], 0x2a) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x3fffffff, 0x0) write$P9_RGETATTR(r3, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000880)={0x7, 0x4d, 0x1}, 0x7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) umount2(&(0x7f0000000500)='./file0\x00', 0x0) getrusage(0x0, &(0x7f0000000580)) fallocate(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1000f4) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x20) syz_emit_ethernet(0xe0, &(0x7f0000000700)={@dev={[], 0xa}, @remote, [], {@ipv4={0x800, {{0x7, 0x4, 0x3, 0x7, 0xd2, 0x67, 0x9, 0x8, 0xff, 0x0, @broadcast, @multicast1, {[@cipso={0x86, 0x6}]}}, @igmp={0x36, 0x0, 0x0, @dev={0xac, 0x14, 0x14, 0x15}, "69491495f2b6037519fa0c43c090eccbf08e3fbe0f2288ac752c43a6b5f34fed1666c1e2829e62b5b2e2f110bcb4cc0d162b896d9911560ee6c4110f407b974ea1e81ca168e8ec26f1d17483f9e631e0f30a131a6d7a8cf6edd2d08b64d685a6111d1df2b9eeddf7b4a421149607de924168a9b00569b6e9bfc9bcff135b74d8b7587c44e8cfc6e684ea26002030f815bfd1bf5c44a4bd6fdcef3b6dfcd337612ea5a6c014033147ff646ed04905"}}}}}, &(0x7f0000000640)={0x1, 0x2, [0xd9b, 0x6fa, 0x10b, 0x685]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) write$P9_RXATTRCREATE(r3, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) r6 = socket$inet(0x2, 0x2, 0x0) bind$inet(r6, &(0x7f0000eed000)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) setsockopt$inet_tcp_TLS_TX(r5, 0x6, 0x1, &(0x7f0000000800), 0x4) ioctl$UFFDIO_COPY(r5, 0xc028aa03, &(0x7f0000000540)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1}) syz_emit_ethernet(0x1, &(0x7f0000000cc0)=ANY=[@ANYBLOB="01802400000000ffff000000000000e0800001000000010401907800d7050200f53475000000"], 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 19:30:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) [ 923.860889] IPVS: ftp: loaded support on port[0] = 21 19:30:16 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0xc020660b, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:16 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f2, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) [ 923.917931] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:30:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:16 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f2, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:16 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8921, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:16 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89a3, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000100)=0x4) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @dev}, {0x1, @broadcast}, 0x4, {0x2, 0x0, @loopback}}) 19:30:16 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f2, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40edb851afcf8d1f955e4fe153ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b04000000e14a92bfb826ec8565cb86aec8c73be1c0e402d4423fb2d550780bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1ee47bb43176cf471157c73e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7e7246cdfb6c0ab6c183ecedaefd52d3cf4d376e226541fc545d3da94d5c7771422f7ca4db1c36df794c20f88c2ec7e031e6f30463b0f49e5ca1b8efc5bd1faf79d9b5de778a26c93b38542394976000000000000e0434e5d913c3611346592dda845d7dba0080000d7de06a3fdfb61f3247e6fe30c83927f69a28b9c23a0c9ec5388712ab412aba994098b2eca986b4842b4c107fdc2e615a87bc892fc6f9b877e76f472abd8a4555ded1320090126a59426efac6e63bf36e13e38307590d06fdb4922495d4076fe4783e5274dd60812"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:16 executing program 2 (fault-call:23 fault-nth:0): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:16 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8990, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:16 executing program 1: r0 = socket$unix(0x1, 0x7, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000000c0)) sendto(r0, &(0x7f0000000100)="2510", 0x2, 0x80, &(0x7f0000000140)=@ipx={0x4, 0x6, 0x200, "b690cb46137b", 0x5be1}, 0x80) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4}}, &(0x7f0000000300)=0xe8) setsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f0000000340)={@local, r3}, 0x14) r5 = creat(&(0x7f0000000380)='./file0\x00', 0x10) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000003c0)=0x53) r6 = openat$cgroup_procs(r5, &(0x7f0000000400)='cgroup.threads\x00', 0x2, 0x0) r7 = syz_open_dev$usb(&(0x7f0000000440)='/dev/bus/usb/00#/00#\x00', 0x1, 0x200000) ioctl$TIOCGSID(r7, 0x5429, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r7, 0xc1105517, &(0x7f0000000500)={{0x1, 0x0, 0x4, 0x8c88, '\x00', 0xfffffffffffffffc}, 0x1, 0x0, 0x4, r8, 0x2, 0x3, 'syz1\x00', &(0x7f00000004c0)=['/dev/bus/usb/00#/00#\x00', '\x00'], 0x16, [], [0xffff, 0x6d493cea, 0x2, 0x9]}) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) write$P9_RSTATFS(r5, &(0x7f0000000640)={0x43, 0x9, 0x2, {0x39, 0x3, 0x8000, 0x8, 0x55, 0x2, 0x7, 0xa78, 0x6}}, 0x43) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) r9 = syz_open_pts(r7, 0x200000) r10 = creat(&(0x7f0000000700)='./file0\x00', 0x20) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000740)=0x1, 0x4) ioctl$SCSI_IOCTL_SEND_COMMAND(r7, 0x1, &(0x7f0000000780)={0xcb, 0xd9d2, 0x8, "f08411af5638703a3d06d308246200f33e828bba26dbc64d6a4749c5dd3a9a379b3dac8e6e373605b98b3db6cea514b3dffd0a6f6e7f934d34084260e8489d7b0a5c7404468cd381e290255e6f6d9e9a538cf3f51ffed663aced4cb98d49d16b10a66d9d13d314541258e76e715f153c4b7cbb7c092029b3e312f522ffaece9164059d6ceec4630067d98b825a22104652f790609e2e91fce6da4dfc79cc5515113a900f9c3baf54b9c9c771f30a463a6d90b7a8c33a2caee8af0a87ecba951ab59e6e7060295bac0fa1de"}) r11 = gettid() ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r10, 0xc08c5336, &(0x7f0000000880)={0x3, 0x76, 0x1, 'queue1\x00', 0x2}) connect(r7, &(0x7f0000000940)=@ll={0x11, 0xfd, r3, 0x1, 0x9, 0x6, @dev={[], 0x16}}, 0x80) mount$9p_fd(0x0, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='9p\x00', 0x40, &(0x7f0000000a40)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache='fscache'}, {@afid={'afid', 0x3d, 0x10001}}, {@debug={'debug', 0x3d, 0xffffffffffffd58f}}, {@cache_mmap='cache=mmap'}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fowner_gt={'fowner>', r4}}, {@hash='hash'}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x35, 0x37, 0x32, 0x34, 0x39, 0x77, 0x7e], 0x2d, [0x62, 0x62, 0x39, 0x39], 0x2d, [0x7e, 0x37, 0x66, 0x77], 0x2d, [0x64, 0x0, 0x67, 0x7a], 0x2d, [0x66, 0x35, 0x0, 0x75, 0x75, 0x62, 0x37, 0x30]}}}, {@dont_measure='dont_measure'}, {@subj_user={'subj_user', 0x3d, 'posix_acl_access}'}}, {@obj_user={'obj_user', 0x3d, 'syz1\x00'}}, {@euid_eq={'euid', 0x3d, r4}}]}}) clock_gettime(0x0, &(0x7f0000000b80)={0x0, 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r7, 0xc0385720, &(0x7f0000000bc0)={0x1, {r12, r13+30000000}, 0x3, 0x4}) lstat(&(0x7f00000045c0)='./file0\x00', &(0x7f0000004600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r5, &(0x7f00000047c0)={&(0x7f0000000c00)=@proc={0x10, 0x0, 0x25dfdbfd, 0x440}, 0xc, &(0x7f0000004580)=[{&(0x7f0000000c40)={0xd8, 0x27, 0x1, 0x70bd2b, 0x25dfdbfb, "", [@nested={0x54, 0x96, [@generic="06b7daa78b678bdbc4938395f06f7aeca00ece0a313c3e8b0bdbdb382702a9578a8efe78888915", @typed={0x8, 0x61, @uid=r4}, @typed={0x14, 0x6a, @ipv6=@mcast2}, @typed={0x4, 0x62}, @typed={0x8, 0xf, @fd=r6}]}, @generic="0cc369ec080183817db5a9fdc110b32abf45c93002b43eb775aa4627b117c9ace13ccd536149066bab678a2f0aeb171462ec22dc805c5f635112d4642cb679d4e808e12821a7fd30a8d4b5", @generic="101ea94700871d3ea2b6", @generic="53b9f4e29a0f14e053b62c7cd5d5cd174aa27bd23d09b1c08a2db6ae841161"]}, 0xd8}, {&(0x7f0000000d40)={0x1310, 0x39, 0xb10, 0x70bd29, 0x25dfdbfc, "", [@typed={0x8, 0x5, @u32=0x8}, @nested={0x1a0, 0x38, [@typed={0xc, 0x53, @u64}, @generic="d825f9c5233457f0544345a154260d0d55a09425788f0ec82a8b81207dae9e8a7e6aa93f9eb57696f0aa88a80c5ae1d9f784b986a1ca91524ad081c8a9bfeb98b0cc28112dec61d7318685a12e6e44ac90c49d16989e0bbf454b54c586ac34a70594a40e658024d5536cfd6cdeb6403387d98c825cefc8032bc8a8f86a8af833dfb9ff005e4f0f582be0ede3fdd3934ed40929d7967bc8ee0e4ec85ba2c46df905b9ac97eed5d9378d1579b08dccc2d32474c76526078906961dc12ae04bcd53c9bfe6c63763c42292c24832c467a15e2e1b8ef26ebeefe13b0802fc", @generic="c5f5bf6a06f3040c993c8ce0962107c51902b859b26c86f238c39f77e84c34e7ed3419ac9f260cc372e4520e82af96152961a26d5777f9807f7fbb89a7e8405ec6802d93a5356da2a3a7ab6d1cb9acefc690354450ca0641515a832e1e987cd4ce790652c3b7dd081c5e26abbaefab6843223ecaa099b702dac81e44a7c1b97002e0fb7f8ac9c04e88adf0fcc2304af54f64e1a694f5a125948ee9427799b2dda3704a764e8e5de9fa029a15d34058a9d053d7dd"]}, @nested={0x1150, 0x85, [@typed={0x8, 0x5d, @pid=r11}, @typed={0x8, 0x96, @u32=0x1000}, @generic="d2503d1cecf2b9fa42873faf1f669e23127cb038ad2b74ea69dac2984a33e4c343fc7fdd98293c8f203a5c37d721151323fbd69f1cae1ce096c39edc9ae61902fb2d3fc3fcea832aa59efbb9f84f071168292a6b67215cd3da95eeaef672aa2a684921d5dfd8019c4951c5a5d6c4b4ccfb6a40b4a3337d5409d690f7dff7a58fedc320f0eff3562bd0311a8a83b6e481d0c4a7ab180dadc15608618840681b03eed5f1", @typed={0xc, 0x59, @u64=0x7}, @generic="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", @typed={0xc, 0x1a, @u64=0x5}, @typed={0x80, 0x2c, @binary="8a3a93510eab14e646fed17eab920087f7aefe975c63c0410875096172ff26892129515b8f2d6741dae72c1e9dd629f12eb6ad71c9c691203bd8795f7028b68b1b85bcf5d0002979a99a3f6cf4360dae2a7f9dbd50e3b76a6ac1184fa2e96c8aacba9b090183057789f14e1ed062990d0c7d2a8c3f42cf00a8ca"}]}, @typed={0x8, 0x8b, @pid=r11}]}, 0x1310}, {&(0x7f0000002080)={0x24ec, 0x38, 0x100, 0x70bd27, 0x25dfdbfb, "", [@nested={0x137c, 0x2d, [@generic="0fce6c2fd092fa92db4eee99ab91abdf95821c7224fb0d8f9aba4349910d2831ea7efcf2f7035edfd0e2f390ca8ecd59c9f86ca2afb3a941dcd781a509f2ed52916386d6075e1642e556c97cd2", @generic="c0e5224e283b93dcdd6d5e4114ad8a07d137f4e1bd157039d8a0701f89924dc4dc67ff8a1618700686fdbf54e37dca6e5bd17ff9f1aea9acae4669e0782f41bbbdd72951b9368a4381324be5ff5b1ce5248f499d8ee038c7f6bd2039e6bf3bf18da2a8b74be8f6f172faf18df28bf8d73d2778661966eb30f5adb81be7a0553ecd", @generic="455806b776c6eaf096f84ba8e287e7845173876c8affe6a8c0fd2d439016d67f272ed7513e6a2200e4423f74959b75558d1d7f234529693133aa1043fa8b0f5ba74b90fd2b0374b516f8e70e18d4e7e814bcb5236912a681f93a32dd83e5c35d9317b9370e2a824505dc3081945d7cbbb80818132b391f57b6e18c2e4eacfe36125e150446146b2e6875933412fc0cd18c001f62342d2815b365136282493da74752a217475b90fca69452f7804e7f9718", @generic="9ec71202d570b4f0904366be53784b62bb48db58f79875953f9ec5597633c0c5d7d341f7fae5a21bb7a23bdc9e15d8e7c68d1a84f927c8b1faee14a8ded40a1f42ce891ff53365df035cc44e900a95a1dd67777eac07dc2eb82dfdfe68d1748c736b97eb1910a1e5e84f7c1d92009d07094850c9602b67ef5bdfb9c0ebb2da92ed486ba5055bcc30c2b36cd8ef9b2afc4dd169ab013352db1effe70c82eb25950a88606ee7a01a82b81fcd1fe4cc3f38c69631c923cac66df291cad3679fe0e8497b544b8683ac77", @generic="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", @generic="6e54920b5eeebd3ba66742a1be93ef78900dfb7b8bbcb06fb7694fbdd5da435a2cc98287d784db1cbf72c8fb46ea37b6bd82486d829172f73f9be37ff2d0943a689d039b1f0e10fb5097609ae92c11da3c411160ee6ffe1874fe953382c5e32cd9f65245092ce42849c6a26f2a64916e78f9fffa56510d47249348eebbd0b5291afbfd750dd89755d18e2d9abab914b6221eaa1855309f06e8f6e2640be384418b29e3d828efd9bb739992132814d9665bb325fd4a68c48e6a139fc9a10b95", @generic="810cb6d87360a76f34f9300ac957d2cc947cd05b4f61865fd5c8c72eb44194278615c0f38c2b8563e989e5fc52b0a8fc88932d11480a790a7cac35616e3a04afb4168ca12a6a0bcd8156a7345ad22e0b2fcc9edf0bb49b73c6b4445e8fff965a9f1072a81cddaf7d", @typed={0x8, 0x38, @uid=r4}]}, @generic="62f1c8a939d533875f3026c8ed5bb853cd2716eec747217ff140da6ba0594149638d6ce3820f4e6341405ef569c6d5818d99ce034d00ddd2ba32458979efbf5c17f6b6", @nested={0x111c, 0x7, [@generic="35cfc1fc57d3863b1b0f7dbea10699b29c", @generic="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", @generic="71a5158ad4937e21dcb6c03f176c4ac166889d4c43ff69842765cf234769ebac0f00fb47d38758175ac85281d6e5bff6916556d46675ee573ab9aab15483076d41f8c00806e4d67d6da67f4f090d8f1d478f0a82c3825fa83e29ad32677b3d3827dc70eddfe8d69e4164ab1ad7e023c24e", @typed={0x14, 0x6c, @ipv6}, @generic="413fd90c4e5d3b6ea9916391d00eae2a157ad36354c2387e69b30ea5941080636a604b1e138a25919f7931106e4c502a28b6ae1186fabac7c4aee31c8bbec8f22dad2e2845bc1f2256b29c59b41378096b4d7d5782aa2706d6cb2363", @typed={0x8, 0xe, @uid=r4}, @typed={0xc, 0x1a, @u64=0x67b1}, @typed={0x8, 0x8d, @pid=r8}, @typed={0x8, 0x66, @fd=r6}]}]}, 0x24ec}], 0x3, &(0x7f0000004680)=[@rights={0x18, 0x1, 0x1, [r2]}, @rights={0x20, 0x1, 0x1, [r0, r2, r2, r1]}, @rights={0x28, 0x1, 0x1, [r9, r5, r5, r1, r0]}, @rights={0x18, 0x1, 0x1, [r0, r9]}, @rights={0x20, 0x1, 0x1, [r5, r1, r2, r10]}, @rights={0x20, 0x1, 0x1, [r1, r6, r9]}, @rights={0x28, 0x1, 0x1, [r9, r2, r9, r10, r10]}, @cred={0x20, 0x1, 0x2, r11, r4, r14}, @rights={0x10}], 0x110, 0x1}, 0x4000000) fcntl$setpipe(r0, 0x407, 0x4) [ 924.647313] 9pnet: Insufficient options for proto=fd 19:30:16 executing program 4: ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000400), &(0x7f0000000440)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x511042) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syzkaller1\x00', {0x2, 0x4e24, @broadcast}}) ioctl$RTC_WIE_ON(r0, 0x700f) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'tunl0\x00', @ifru_names='bridge0\x00'}) write$FUSE_NOTIFY_STORE(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="2f00000004000000000000000000000002000083658dcb7cb1d5e4bde20000000000090000000000000007000000006dc495c7e29f0fc5c38eccfb9d4cb53a5c89ddbc8b5ddafede6e5448dad625621cd90c8830e2dc83534b9b198f9d7fc07f64f9db4293e577ad68c3bc8ee1ef2767c7047600c74192a4b7c8be7ed2eeafb026c185"], 0x2f) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x80000001, 0xffffffffffffffff, &(0x7f0000000340)="3cee2841e733f9619b3cff2f2656faa2e742ec8c4af6291a4c12f6c9bfcf805991c0fae4be747c4edb68", 0x2a}, &(0x7f00000003c0)) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000500)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) [ 924.682694] 9pnet: Insufficient options for proto=fd 19:30:17 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f00002de000/0x2000)=nil, 0x2000, 0xf) clone(0x0, &(0x7f0000000240), &(0x7f0000001ffc), &(0x7f00000001c0), &(0x7f0000000040)) times(&(0x7f0000000040)) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3b000}], 0x200000000000000f, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)={0x0, 0x0}) fcntl$lock(r0, 0x5, &(0x7f0000000100)={0x0, 0x2, 0x9, 0x4, r2}) 19:30:17 executing program 3: socket$inet6(0xa, 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000580)='/dev/input/event#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, {0xa, 0x0, 0x0, @dev}}}, 0x48) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r1, r1, &(0x7f00000001c0)=0x6, 0xa198) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) 19:30:17 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89b0, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:17 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) [ 924.830264] IPVS: ftp: loaded support on port[0] = 21 19:30:17 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x8995, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) [ 925.109458] IPVS: ftp: loaded support on port[0] = 21 19:30:17 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0xc0189436, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:17 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x5451, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:17 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f0, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40edb851afcf8d1f955e4fe153ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b04000000e14a92bfb826ec8565cb86aec8c73be1c0e402d4423fb2d550780bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1ee47bb43176cf471157c73e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7e7246cdfb6c0ab6c183ecedaefd52d3cf4d376e226541fc545d3da94d5c7771422f7ca4db1c36df794c20f88c2ec7e031e6f30463b0f49e5ca1b8efc5bd1faf79d9b5de778a26c93b38542394976000000000000e0434e5d913c3611346592dda845d7dba0080000d7de06a3fdfb61f3247e6fe30c83927f69a28b9c23a0c9ec5388712ab412aba994098b2eca986b4842b4c107fdc2e615a87bc892fc6f9b877e76f472abd8a4555ded1320090126a59426efac6e63bf36e13e38307590d06fdb4922495d4076fe4783e5274dd60812"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:17 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x8937, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:17 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0xc0045878, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:18 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x10000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000000)={0x0, @empty, @multicast2}, &(0x7f0000000040)=0x1e) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, r2}, 0xc) ioctl$sock_SIOCINQ(r0, 0x8912, &(0x7f0000000140)) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000080)={'erspan0\x00', 0xf364aee}) 19:30:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:18 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x8923, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40ed19afe7e68d1f955e4fe953ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b0400000000000000e14a92bfb826ec8531cb86aec8c73be1c0e402d4423fb2d550390bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1eb664b5a0eb90381e615cfe17473046d3267ee47bb43176cf471157c71e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7c95f54e3f4d376e226541fc2ec7e031e6f30463b0f493e737de5ca1b8efc5bd1faf79d9b5de77aa26c93b385425a49760000a845d7dba0000000000000000000000000000000000000000000000048000000"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:18 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8913, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:18 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x8995, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clock_getres(0x4, &(0x7f0000000040)) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x10, 0x5, 0xc) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000000)={0x7}) mq_timedreceive(r2, &(0x7f00000002c0)=""/4096, 0x1000, 0x3, &(0x7f0000000100)) sendmsg(r1, &(0x7f0000000240)={0x0, 0x274, &(0x7f0000000200)=[{&(0x7f0000001440)="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", 0x227}], 0x1, 0x0, 0x0, 0x4000000000000}, 0xfffffffffffffffe) 19:30:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:18 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x200001, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x33b) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = socket$inet(0x2, 0x6, 0xfff) getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)) quotactl(0x9, &(0x7f00000000c0)='./file0\x00', r3, &(0x7f0000000240)) r4 = memfd_create(&(0x7f0000000240)='/dev/ppp\x00', 0x2) openat$cgroup_procs(r4, &(0x7f0000000280)='tasks\x00', 0x2, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x200, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000080)=r5, 0x4) 19:30:18 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x5451, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40edb851afcf8d1f955e4fe153ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b04000000e14a92bfb826ec8565cb86aec8c73be1c0e402d4423fb2d550780bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1ee47bb43176cf471157c73e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7e7246cdfb6c0ab6c183ecedaefd52d3cf4d376e226541fc545d3da94d5c7771422f7ca4db1c36df794c20f88c2ec7e031e6f30463b0f49e5ca1b8efc5bd1faf79d9b5de778a26c93b38542394976000000000000e0434e5d913c3611346592dda845d7dba0080000d7de06a3fdfb61f3247e6fe30c83927f69a28b9c23a0c9ec5388712ab412aba994098b2eca986b4842b4c107fdc2e615a87bc892fc6f9b877e76f472abd8a4555ded1320090126a59426efac6e63bf36e13e38307590d06fdb4922495d4076fe4783e5274dd60812"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:18 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x8995, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:18 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x8933, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:18 executing program 4: r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000)=0x9, 0x4) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000040)=0x2) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000100)={0x7, 0x3, 'client1\x00', 0x2, "3ab771fd4bf84578", "1f8187ee9a6394b1ee8bc74dbb61969b95cafe3a535c84f53575cc2118fd688a", 0x6, 0x4}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a") sendfile(r0, r1, &(0x7f00000000c0), 0x80000002) 19:30:18 executing program 1: munmap(&(0x7f0000000000/0x4000)=nil, 0x4000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000080)=""/91, 0xffffffffffffffa0) 19:30:18 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8943, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:19 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, &(0x7f0000000040)={0x0, @time, 0x604fe5e4, {0x6, 0x8001}, 0x3, 0x1, 0x3}) setsockopt$sock_void(r2, 0x1, 0x3f, 0x0, 0x0) 19:30:19 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x8995, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40ed19afe7e68d1f955e4fe953ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b0400000000000000e14a92bfb826ec8531cb86aec8c73be1c0e402d4423fb2d550390bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1eb664b5a0eb90381e615cfe17473046d3267ee47bb43176cf471157c71e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7c95f54e3f4d376e226541fc2ec7e031e6f30463b0f493e737de5ca1b8efc5bd1faf79d9b5de77aa26c93b385425a49760000a845d7dba0000000000000000000000000000000000000000000000048000000"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:19 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x8930, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="000000000000bfcbaad85a63d02750b05cce81da07cdc91ef577be40ed19afe7e68d1f955e4fe953ceba3c3d1b28327112e4b101d51bdd27769beeecfdc4199dae581ad8ea2b0400000000000000e14a92bfb826ec8531cb86aec8c73be1c0e402d4423fb2d550390bbc1c221f182716d81d9ed4498593fb7b30248aeebfa84b1eb664b5a0eb90381e615cfe17473046d3267ee47bb43176cf471157c71e31e7a77ced85c154b1a62e508fc206bef518fc8f24a2a96192a03879e994aa12192a6b6ed7c95f54e3f4d376e226541fc2ec7e031e6f30463b0f493e737de5ca1b8efc5bd1faf79d9b5de77aa26c93b385425a49760000a845d7dba0000000000000000000000000000000000000000000000048000000"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:19 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8920, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:19 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0xa13af05975a28797) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000d00)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000dc0)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80240000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x3c, r2, 0x0, 0x70bd29, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_PORT={0x8, 0x1, 0x1a}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x4000) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=ANY=[]) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r3, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f0000000200)={{0x2, 0x4e23}, {0x1, @random="f71d78b9bc66"}, 0x14, {0x2, 0x4e22, @multicast2}, 'erspan0\x00'}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) getpgrp(0x0) writev(r3, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) sendmsg(r3, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r3, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 19:30:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:19 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x5452, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:19 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x8995, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) 19:30:19 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8927, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:19 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f00000001c0)={{0x80}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000100", 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfff}) 19:30:19 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x8971, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) 19:30:19 executing program 0 (fault-call:10 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x39a191, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xfffffec1) 19:30:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000080)={0x0, 0xcc0a}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000180)={r3, @in={{0x2, 0x4e21, @multicast1}}}, &(0x7f0000000240)=0x84) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f00000064c0)={&(0x7f0000000040), 0xc, &(0x7f0000006480)={&(0x7f0000005e40)={0x14}, 0x14}}, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r2) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') sendmsg$TEAM_CMD_NOOP(r1, &(0x7f00000020c0)={&(0x7f00000000c0)={0x10, 0x300}, 0xc, &(0x7f0000002080)={&(0x7f0000001f80)={0x14, r4, 0x2d}, 0x14}}, 0x0) 19:30:19 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8930, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:19 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x8995, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') [ 927.234003] FAULT_INJECTION: forcing a failure. [ 927.234003] name fail_page_alloc, interval 1, probability 0, space 0, times 0 19:30:19 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x5421, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) r8 = dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r8, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r6, 0x402, 0x4) [ 927.334875] CPU: 0 PID: 1513 Comm: syz-executor0 Not tainted 4.19.0-rc6-next-20181005+ #88 [ 927.343346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 927.352727] Call Trace: [ 927.355340] dump_stack+0x1d3/0x2c4 [ 927.359442] ? dump_stack_print_info.cold.2+0x52/0x52 [ 927.364651] ? zap_class+0x640/0x640 [ 927.368384] should_fail.cold.4+0xa/0x17 [ 927.372464] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 927.378017] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 927.383137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 927.388691] ? __perf_event_task_sched_in+0x2a9/0xb60 [ 927.393901] ? perf_trace_lock+0x14d/0x7a0 [ 927.398157] ? perf_sched_cb_inc+0x350/0x350 [ 927.402578] ? reweight_entity+0x10f0/0x10f0 [ 927.407009] ? zap_class+0x640/0x640 [ 927.410738] ? finish_task_switch+0x1f5/0x900 [ 927.415244] ? lock_downgrade+0x900/0x900 [ 927.419399] ? finish_task_switch+0x1b5/0x900 [ 927.423914] ? trace_hardirqs_on+0xbd/0x310 [ 927.428248] ? finish_task_switch+0x1f5/0x900 [ 927.432760] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 927.438223] ? dequeue_entity+0x1770/0x1770 [ 927.442568] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 927.448135] ? mark_held_locks+0x130/0x130 [ 927.452393] __alloc_pages_nodemask+0x34b/0xdd0 [ 927.457423] ? preempt_notifier_register+0x200/0x200 [ 927.463229] ? __switch_to_asm+0x34/0x70 [ 927.467306] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 927.472335] ? __switch_to_asm+0x34/0x70 [ 927.476405] ? __switch_to_asm+0x34/0x70 [ 927.480472] ? __switch_to_asm+0x40/0x70 [ 927.484549] ? __switch_to_asm+0x34/0x70 [ 927.488633] ? __switch_to_asm+0x40/0x70 [ 927.492713] ? __switch_to_asm+0x34/0x70 [ 927.496793] ? mark_held_locks+0x130/0x130 [ 927.501043] ? __schedule+0x874/0x1ed0 [ 927.504962] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 927.511560] ? check_preemption_disabled+0x48/0x200 [ 927.517899] ? debug_smp_processor_id+0x1c/0x20 [ 927.522591] ? perf_trace_lock+0x14d/0x7a0 [ 927.526861] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 927.532420] alloc_pages_current+0x10c/0x210 [ 927.536849] ? zap_class+0x640/0x640 [ 927.540584] skb_page_frag_refill+0x45f/0x6a0 [ 927.545104] ? kasan_check_write+0x14/0x20 [ 927.549362] ? sock_kfree_s+0x60/0x60 [ 927.553187] ? lock_acquire+0x1ed/0x520 [ 927.557174] ? __lock_sock+0x203/0x350 [ 927.561081] ? lock_downgrade+0x900/0x900 [ 927.565245] ? _raw_spin_unlock_bh+0x30/0x40 [ 927.569676] ? remove_wait_queue+0x360/0x360 [ 927.574111] sk_page_frag_refill+0x55/0x1f0 [ 927.578448] sk_alloc_sg+0x1e9/0xa00 [ 927.582187] ? sk_page_frag_refill+0x1f0/0x1f0 [ 927.586792] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 927.592260] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 927.597813] ? check_preemption_disabled+0x48/0x200 [ 927.602839] ? lock_sock_nested+0x9a/0x120 [ 927.607268] ? lock_sock_nested+0x9a/0x120 [ 927.611581] alloc_encrypted_sg+0xb4/0x140 [ 927.615843] tls_sw_sendmsg+0x7ed/0x1fd0 [ 927.619921] ? zap_class+0x640/0x640 [ 927.623656] ? dput.part.25+0x26d/0x790 [ 927.627657] ? check_preemption_disabled+0x48/0x200 19:30:19 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400000, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x1, 'bridge_slave_0\x00', 0x1}, 0x18) r1 = socket$inet6(0xa, 0xe, 0x1d) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r2, 0xc008551c, &(0x7f0000000080)={0x6d, 0x18, [0x5, 0x20, 0x1ff, 0xffffffffc2964a90, 0xcf, 0x1ff]}) ioctl$RTC_PIE_OFF(r2, 0x7006) fcntl$getflags(r2, 0x401) ioctl$void(r2, 0xc0045c78) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000240)={0xa0, 0x100000, 0x0, 0x0, 0x705000}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x80000001, 0x2, 0x7, 0x20, 0x101}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000180)={r3, 0x8001, 0xfff, 0x5, 0x6, 0x10000}, &(0x7f00000001c0)=0x14) 19:30:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000080)={0x0, 0xcc0a}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000180)={r3, @in={{0x2, 0x4e21, @multicast1}}}, &(0x7f0000000240)=0x84) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f00000064c0)={&(0x7f0000000040), 0xc, &(0x7f0000006480)={&(0x7f0000005e40)={0x14}, 0x14}}, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r2) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') sendmsg$TEAM_CMD_NOOP(r1, &(0x7f00000020c0)={&(0x7f00000000c0)={0x10, 0x300}, 0xc, &(0x7f0000002080)={&(0x7f0000001f80)={0x14, r4, 0x2d}, 0x14}}, 0x0) [ 927.632701] ? aa_profile_af_perm+0x410/0x410 [ 927.637218] ? tx_work_handler+0xf0/0xf0 [ 927.641293] ? check_same_owner+0x330/0x330 [ 927.645639] ? zap_class+0x640/0x640 [ 927.649369] ? aa_file_perm+0x469/0x1060 [ 927.653442] ? __might_sleep+0x95/0x190 [ 927.657430] ? aa_sk_perm+0x22b/0x8e0 [ 927.661250] ? aa_af_perm+0x5a0/0x5a0 [ 927.665097] inet_sendmsg+0x19c/0x690 [ 927.668921] ? ipip_gro_receive+0x100/0x100 [ 927.673261] ? apparmor_socket_sendmsg+0x29/0x30 [ 927.673282] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 927.673301] ? security_socket_sendmsg+0x94/0xc0 [ 927.683599] ? ipip_gro_receive+0x100/0x100 [ 927.683631] sock_sendmsg+0xd5/0x120 [ 927.683650] sock_write_iter+0x35e/0x5c0 [ 927.683667] ? sock_sendmsg+0x120/0x120 [ 927.683692] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 927.692757] ? iov_iter_init+0xc2/0x1e0 [ 927.692779] __vfs_write+0x6b8/0x9f0 [ 927.692798] ? kernel_read+0x120/0x120 [ 927.692817] ? apparmor_path_rmdir+0x30/0x30 [ 927.692838] ? lock_release+0x970/0x970 [ 927.700602] ? check_preemption_disabled+0x48/0x200 19:30:20 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f3, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) [ 927.700637] ? apparmor_file_permission+0x24/0x30 [ 927.700658] ? rw_verify_area+0x118/0x360 [ 927.700678] vfs_write+0x1fc/0x560 [ 927.748643] ksys_write+0x101/0x260 [ 927.752281] ? __ia32_sys_read+0xb0/0xb0 [ 927.756361] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 927.761828] __x64_sys_write+0x73/0xb0 [ 927.765735] do_syscall_64+0x1b9/0x820 [ 927.769641] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 927.775020] ? syscall_return_slowpath+0x5e0/0x5e0 [ 927.779962] ? trace_hardirqs_on_caller+0x310/0x310 [ 927.784991] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 927.790017] ? recalc_sigpending_tsk+0x180/0x180 [ 927.794878] ? kasan_check_write+0x14/0x20 [ 927.799134] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 927.803994] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 927.809188] RIP: 0033:0x457579 [ 927.812393] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 927.831305] RSP: 002b:00007fa6ea786c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 927.839030] RAX: ffffffffffffffda RBX: 00007fa6ea786c90 RCX: 0000000000457579 [ 927.846314] RDX: 00000000fffffec1 RSI: 0000000020000300 RDI: 0000000000000003 [ 927.853591] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 927.860875] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa6ea7876d4 [ 927.868153] R13: 00000000004c553b R14: 00000000004d8e50 R15: 0000000000000005 19:30:20 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x3, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [{0x2, 0x3, 0x3, 0x0, 0x8, 0xfffffffffffffffe, 0x100, 0x7}], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0xa9) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x40) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r5, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r6 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r6, 0x8995, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001a80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000000)={@remote, 0x0}, &(0x7f0000000200)=0x14) dup2(r6, r6) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000400)={r7, @loopback, @rand_addr=0x1cb}, 0xc) 19:30:20 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8930, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:20 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000800), 0x0, 0xb}}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) write$binfmt_elf32(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x2, 0x3, 0x8, 0x4, 0x4, 0x0, 0x6, 0x390, 0x38, 0xe0, 0x0, 0x7f, 0x20, 0x1, 0x0, 0x1ff}, [], "6e644ef12d7ecb815087d24b62d24fea7dd3cd1c52675f39898bfe2579cd88afdc1492e5d7f023d625539e10799bfd28310197f1506d61efe89f5048e16f3a350379e7390651823d7015af02df30a47eb0"}, 0x89) r1 = geteuid() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xdb38, 0x36600) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000001880)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/162, 0xa2}], 0x6, 0x0, 0x0, 0x100000000}, 0x1) setfsuid(r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x3) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r4 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x705000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r5 = pkey_alloc(0x0, 0x2) pkey_free(r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200000, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x8923, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000001940)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f0000000100)={@remote}, &(0x7f0000000200)=0x14) dup2(r9, r9) 19:30:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000080)={0x0, 0xcc0a}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000180)={r3, @in={{0x2, 0x4e21, @multicast1}}}, &(0x7f0000000240)=0x84) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f00000064c0)={&(0x7f0000000040), 0xc, &(0x7f0000006480)={&(0x7f0000005e40)={0x14}, 0x14}}, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r2) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') sendmsg$TEAM_CMD_NOOP(r1, &(0x7f00000020c0)={&(0x7f00000000c0)={0x10, 0x300}, 0xc, &(0x7f0000002080)={&(0x7f0000001f80)={0x14, r4, 0x2d}, 0x14}}, 0x0) [ 928.113204] @: renamed from ip6gre0 [ 928.169966] kasan: CONFIG_KASAN_INLINE enabled [ 928.174632] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 928.182229] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 928.189970] CPU: 1 PID: 1510 Comm: syz-executor0 Not tainted 4.19.0-rc6-next-20181005+ #88 [ 928.198369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 928.207817] RIP: 0010:gcmaes_crypt_by_sg+0x56f/0x2110 [ 928.213022] Code: c1 e9 03 80 3c 11 00 0f 85 bf 18 00 00 48 8d 78 08 48 89 84 24 50 01 00 00 48 ba 00 00 00 00 00 fc ff df 48 89 f9 48 c1 e9 03 <0f> b6 14 11 84 d2 74 09 80 fa 03 0f 8e 6b 15 00 00 44 8b 60 08 48 [ 928.232302] RSP: 0018:ffff8801852bf120 EFLAGS: 00010202 [ 928.237685] RAX: 0000000000000000 RBX: ffff88019023c6b0 RCX: 0000000000000001 [ 928.244969] RDX: dffffc0000000000 RSI: ffffffff8359e06c RDI: 0000000000000008 [ 928.252248] RBP: ffff8801852bf520 R08: ffff8801850c4300 R09: ffff8801befb0060 [ 928.259519] R10: ffff8801852bf7b0 R11: ffff8801852bf7db R12: 000000000000000d [ 928.266798] R13: 000000000000000d R14: ffff8801852bf238 R15: ffff8801852bf7d0 [ 928.274078] FS: 00000000025d3940(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 928.282312] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 928.288205] CR2: 0000001b2d128000 CR3: 00000001cd273000 CR4: 00000000001406e0 [ 928.295494] DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 928.302778] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 928.310052] Call Trace: [ 928.312675] ? aesni_gcm_enc_avx2+0x180/0x180 [ 928.317202] ? attach_entity_load_avg+0x860/0x860 [ 928.322067] ? perf_trace_lock+0x14d/0x7a0 [ 928.326317] ? cgroup_base_stat_cputime_account_end.isra.5+0x3f/0x50 [ 928.333400] ? zap_class+0x640/0x640 [ 928.337120] ? rb_erase+0x3710/0x3710 [ 928.340925] ? reweight_entity+0x7d5/0x10f0 [ 928.345256] ? __account_cfs_rq_runtime+0x790/0x790 [ 928.350280] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 928.354877] ? mark_held_locks+0x130/0x130 [ 928.359125] ? zap_class+0x640/0x640 [ 928.362849] ? cpuacct_charge+0x265/0x440 [ 928.367011] ? zap_class+0x640/0x640 [ 928.370733] ? update_curr+0x4cf/0xbe0 [ 928.374635] ? lock_downgrade+0x900/0x900 [ 928.378788] ? check_preemption_disabled+0x48/0x200 [ 928.383814] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 928.388753] ? cgroup_rstat_updated+0xe6/0x470 [ 928.393337] ? check_preemption_disabled+0x48/0x200 [ 928.398363] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 928.403920] gcmaes_encrypt.constprop.17+0x7d7/0x1190 [ 928.409121] ? update_curr+0x4ec/0xbe0 [ 928.413022] ? generic_gcmaes_decrypt+0x190/0x190 [ 928.417877] ? mark_held_locks+0x130/0x130 [ 928.422119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 928.427696] ? finish_task_switch+0x1b5/0x900 [ 928.432635] ? select_task_rq_fair+0x3590/0x3590 [ 928.438519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 928.444069] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 928.449629] ? check_preemption_disabled+0x48/0x200 [ 928.454658] ? debug_smp_processor_id+0x1c/0x20 [ 928.459320] ? perf_trace_lock+0x14d/0x7a0 [ 928.463590] ? __perf_event_task_sched_out+0x337/0x1ab0 [ 928.469046] ? zap_class+0x640/0x640 [ 928.473626] generic_gcmaes_encrypt+0x12d/0x186 [ 928.479965] ? generic_gcmaes_encrypt+0x12d/0x186 [ 928.486373] ? helper_rfc4106_encrypt+0x4a0/0x4a0 [ 928.492629] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 928.499556] ? perf_trace_lock+0x14d/0x7a0 [ 928.503777] ? __switch_to_asm+0x40/0x70 [ 928.507834] ? __switch_to_asm+0x40/0x70 [ 928.511885] gcmaes_wrapper_encrypt+0x162/0x200 [ 928.516552] tls_push_record+0xc12/0x17f0 [ 928.520703] ? tls_tx_records+0x980/0x980 [ 928.524844] ? trace_hardirqs_on+0xbd/0x310 [ 928.529152] ? lock_release+0x970/0x970 [ 928.533115] ? lock_sock_nested+0xe2/0x120 [ 928.537343] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 928.542789] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 928.548328] ? check_preemption_disabled+0x48/0x200 [ 928.553344] ? lock_sock_nested+0x9a/0x120 [ 928.557575] ? lock_sock_nested+0x9a/0x120 [ 928.561822] ? __local_bh_enable_ip+0x160/0x260 [ 928.566490] tls_sw_push_pending_record+0x22/0x30 [ 928.571324] tls_sk_proto_close+0x439/0x750 [ 928.575682] ? tcp_check_oom+0x530/0x530 [ 928.579754] ? tls_push_pending_closed_record+0x240/0x240 [ 928.585353] ? ipv6_sock_mc_close+0x162/0x1d0 [ 928.589842] ? ip_mc_drop_socket+0x20b/0x270 [ 928.594239] ? down_write+0x8a/0x130 [ 928.597951] inet_release+0x104/0x1f0 [ 928.601751] inet6_release+0x50/0x70 [ 928.605517] __sock_release+0xd7/0x250 [ 928.609394] sock_close+0x19/0x20 [ 928.612833] __fput+0x3bc/0xa70 [ 928.616100] ? __sock_release+0x250/0x250 [ 928.620247] ? get_max_files+0x20/0x20 [ 928.624137] ? trace_hardirqs_on+0xbd/0x310 [ 928.628457] ? kasan_check_read+0x11/0x20 [ 928.632623] ? task_work_run+0x1af/0x2a0 [ 928.636686] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 928.642137] ? kasan_check_write+0x14/0x20 [ 928.646369] ? do_raw_spin_lock+0xc1/0x200 [ 928.650601] ____fput+0x15/0x20 [ 928.653880] task_work_run+0x1e8/0x2a0 [ 928.657756] ? task_work_cancel+0x240/0x240 [ 928.662101] ? __schedule+0x1ed0/0x1ed0 [ 928.666080] ? copy_fd_bitmaps+0x210/0x210 [ 928.670324] exit_to_usermode_loop+0x318/0x380 [ 928.674902] ? syscall_trace_enter+0x1260/0x1260 [ 928.679686] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 928.685255] do_syscall_64+0x6be/0x820 [ 928.689138] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 928.694524] ? syscall_return_slowpath+0x5e0/0x5e0 [ 928.699446] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 928.704285] ? trace_hardirqs_on_caller+0x310/0x310 [ 928.709295] ? prepare_exit_to_usermode+0x291/0x3b0 [ 928.714302] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 928.719139] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 928.724315] RIP: 0033:0x411051 [ 928.727495] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 928.746388] RSP: 002b:00007fff40f9a8d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 928.754094] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000411051 [ 928.761354] RDX: 0000001b2da20000 RSI: 0000000000000000 RDI: 0000000000000003 [ 928.768621] RBP: 0000000000000000 R08: 0000000049ccd1ef R09: 0000000049ccd1f3 [ 928.775888] R10: 00007fff40f9a800 R11: 0000000000000293 R12: 0000000000000000 [ 928.783160] R13: 0000000000000001 R14: 000000000000010c R15: 0000000000000000 [ 928.790425] Modules linked in: [ 928.793807] ---[ end trace a8f523110d8ca375 ]--- [ 928.798601] RIP: 0010:gcmaes_crypt_by_sg+0x56f/0x2110 [ 928.803790] Code: c1 e9 03 80 3c 11 00 0f 85 bf 18 00 00 48 8d 78 08 48 89 84 24 50 01 00 00 48 ba 00 00 00 00 00 fc ff df 48 89 f9 48 c1 e9 03 <0f> b6 14 11 84 d2 74 09 80 fa 03 0f 8e 6b 15 00 00 44 8b 60 08 48 [ 928.822846] RSP: 0018:ffff8801852bf120 EFLAGS: 00010202 [ 928.828267] RAX: 0000000000000000 RBX: ffff88019023c6b0 RCX: 0000000000000001 [ 928.835546] RDX: dffffc0000000000 RSI: ffffffff8359e06c RDI: 0000000000000008 [ 928.842893] RBP: ffff8801852bf520 R08: ffff8801850c4300 R09: ffff8801befb0060 [ 928.850187] R10: ffff8801852bf7b0 R11: ffff8801852bf7db R12: 000000000000000d [ 928.857532] R13: 000000000000000d R14: ffff8801852bf238 R15: ffff8801852bf7d0 [ 928.864833] FS: 00000000025d3940(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 928.873129] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 928.879067] CR2: 0000001b2d128000 CR3: 00000001cd273000 CR4: 00000000001406e0 [ 928.886357] DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 928.893685] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 928.900982] Kernel panic - not syncing: Fatal exception [ 928.907720] Kernel Offset: disabled [ 928.911350] Rebooting in 86400 seconds..