1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x39) sendfile(r0, r1, &(0x7f0000000000), 0xffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$addseals(r1, 0x409, 0x8) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000100)="0e", 0x1}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f00000002c0)}, 0x10) [ 640.200174] FAT-fs (loop4): error, invalid access to FAT (entry 0x000001c3) 03:33:33 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e5, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r2 = memfd_create(&(0x7f0000000340)='{ppp1eth1self!user\x00', 0x3) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000010c0)="643d000000000000000000000000000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ccb4f1ddcc8b5241da8945666e007300000000c64dbea37a99557bea78bcd1b1c6d32e836a25b2be553cd0a864c75c06000000794261", 0x0) r4 = socket$inet6(0xa, 0x4000007fffd, 0x1f9) ioctl(r4, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000001040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) prctl$getreaper(0x1b, &(0x7f0000000080)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000300)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000380)={{{@in=@multicast2, @in6}}, {{@in6=@ipv4={[], [], @rand_addr}}}}, &(0x7f0000000480)=0xe8) iopl(0xcf) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000680)={0x0, 0x3}, &(0x7f0000000d40)=0x8) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000004c0)=0x7) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f00000005c0)={r7, 0x5, 0x1}, &(0x7f0000000600)=0x8) keyctl$session_to_parent(0x12) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f0000000f80)=""/176) unshare(0x2000400) r8 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r8, &(0x7f0000001240), 0x0, 0x0, &(0x7f00000012c0)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x10) recvmmsg(r8, &(0x7f0000000cc0)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000003300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/89, 0x59}], 0x2, 0x0, 0x0, 0xff}, 0x4}, {{&(0x7f0000000240)=@llc, 0x80, &(0x7f0000000b00)=[{&(0x7f00000002c0)=""/39, 0x27}, {&(0x7f0000004300)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/147, 0x93}, {&(0x7f0000000780)=""/125, 0x7d}, {&(0x7f0000000800)=""/200, 0xc8}, {&(0x7f0000000900)=""/117, 0x75}, {&(0x7f0000000640)=""/30, 0x1e}, {&(0x7f0000000980)=""/138, 0x8a}, {&(0x7f0000000a40)=""/89, 0x59}, {&(0x7f0000000ac0)=""/14, 0xe}], 0xa, &(0x7f0000000bc0)=""/252, 0xfc, 0x6}}], 0x2, 0x10040, &(0x7f0000000dc0)) connect$llc(r1, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0xffff, 0x2, 0x2, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) r9 = socket$kcm(0x29, 0x2, 0x0) ioctl(r9, 0x8912, &(0x7f0000000000)="0047fc2f07d82c99240970") r10 = socket$inet6_sctp(0xa, 0x5, 0x84) io_setup(0xb, &(0x7f0000000d80)=0x0) io_pgetevents(r11, 0xffffffffffff6346, 0x8, &(0x7f0000000e00)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000f40)={0x0, 0x989680}, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r10, 0x29, 0x31, &(0x7f0000000180)={'IDLETIMER\x00'}, &(0x7f00000001c0)=0x1e) [ 640.280996] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 16) 03:33:33 executing program 0: clock_gettime(0x8, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) geteuid() request_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/vcs\x00', 0xfffffffffffffff8) request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f00000006c0)='em0\x00', 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc) getgid() gettid() getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000f00)=""/4096) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000840)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@local, @in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000880)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000008c0)={0x0, @rand_addr, @broadcast}, &(0x7f0000000a80)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b80)={0x0, @dev}, &(0x7f0000000bc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000e80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001f00), &(0x7f0000001f40)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000001f80)=@can, &(0x7f0000002000)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002040)={@loopback}, &(0x7f0000002080)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000020c0), &(0x7f0000002100)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000037c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004940)={0x0, @local, @dev}, &(0x7f0000004980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006f80)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007080)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000070c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000071c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000072c0)={'vcan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007940)={0x0, @remote, @remote}, &(0x7f0000007980)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000079c0)={0x0, @remote, @broadcast}, &(0x7f0000007a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000007a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007a80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007b00)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@local}}}, &(0x7f0000007c00)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007c80)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000007cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007d00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009f80)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000a080)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000a0c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a100)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000ca00)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f000000cb00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000cb40)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f000000d6c0)={&(0x7f0000000140), 0xc, &(0x7f000000d680)={&(0x7f000000cb80)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="f9805da06a0f460f46dc0f01ee263a208600d7cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c43ef0470fbb4000d6adbe90dfe2987e") [ 640.349964] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000020) 03:33:33 executing program 4: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="0153bc6cda8103f0e685"], &(0x7f0000000540)=0x1) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$binfmt_aout(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x177) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) sendfile(r1, r1, &(0x7f00000000c0), 0x8080fffffffe) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000380)="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") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r2, &(0x7f0000000480), 0x100000000000004f, 0x0) 03:33:33 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)=ANY=[], &(0x7f00000002c0)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000004c0)) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) bind$inet(r1, &(0x7f0000000580)={0x2, 0x104e23, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0a, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000280)={0x0, 0x200, 0x30}, &(0x7f0000000400)=0xc) ioctl$TCGETS(r0, 0x5401, &(0x7f00000000c0)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)="0a5cc80700315f") socket$nl_netfilter(0x10, 0x3, 0xc) 03:33:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x39) sendfile(r0, r1, &(0x7f0000000000), 0xffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$addseals(r1, 0x409, 0x8) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000100)="0e", 0x1}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f00000002c0)}, 0x10) 03:33:33 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x1fffff, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000580)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)=')em0[\x00', 0xffffffffffffff9c}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000880)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in6=@mcast2, @in6=@local}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in6, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000006c0), 0x0, &(0x7f0000000e00)}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000500)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0x4) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000400), &(0x7f00000003c0)=0xffffffffffffffae) getgid() seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000005c0), &(0x7f0000000600)=0x8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000004c0), 0x8) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000300), 0x10) 03:33:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x39) sendfile(r0, r1, &(0x7f0000000000), 0xffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$addseals(r1, 0x409, 0x8) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000100)="0e", 0x1}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f00000002c0)}, 0x10) 03:33:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x39) sendfile(r0, r1, &(0x7f0000000000), 0xffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$addseals(r1, 0x409, 0x8) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000100)="0e", 0x1}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f00000002c0)}, 0x10) 03:33:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x39) sendfile(r0, r1, &(0x7f0000000000), 0xffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$addseals(r1, 0x409, 0x8) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000100)="0e", 0x1}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f00000002c0)}, 0x10) 03:33:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x39) sendfile(r0, r1, &(0x7f0000000000), 0xffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$addseals(r1, 0x409, 0x8) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000100)="0e", 0x1}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f00000002c0)}, 0x10) 03:33:34 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)=ANY=[], &(0x7f00000002c0)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000004c0)) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) bind$inet(r1, &(0x7f0000000580)={0x2, 0x104e23, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0a, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000280)={0x0, 0x200, 0x30}, &(0x7f0000000400)=0xc) ioctl$TCGETS(r0, 0x5401, &(0x7f00000000c0)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)="0a5cc80700315f") socket$nl_netfilter(0x10, 0x3, 0xc) 03:33:34 executing program 0: clock_gettime(0x8, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) geteuid() request_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/vcs\x00', 0xfffffffffffffff8) request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f00000006c0)='em0\x00', 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc) getgid() gettid() getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000f00)=""/4096) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000840)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@local, @in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000880)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000008c0)={0x0, @rand_addr, @broadcast}, &(0x7f0000000a80)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b80)={0x0, @dev}, &(0x7f0000000bc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000e80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001f00), &(0x7f0000001f40)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000001f80)=@can, &(0x7f0000002000)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002040)={@loopback}, &(0x7f0000002080)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000020c0), &(0x7f0000002100)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000037c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004940)={0x0, @local, @dev}, &(0x7f0000004980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006f80)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007080)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000070c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000071c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000072c0)={'vcan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007940)={0x0, @remote, @remote}, &(0x7f0000007980)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000079c0)={0x0, @remote, @broadcast}, &(0x7f0000007a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000007a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007a80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007b00)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@local}}}, &(0x7f0000007c00)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007c80)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000007cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007d00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009f80)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000a080)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000a0c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a100)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000ca00)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f000000cb00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000cb40)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f000000d6c0)={&(0x7f0000000140), 0xc, &(0x7f000000d680)={&(0x7f000000cb80)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="f9805da06a0f460f46dc0f01ee263a208600d7cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c43ef0470fbb4000d6adbe90dfe2987e") 03:33:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x39) sendfile(r0, r1, &(0x7f0000000000), 0xffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$addseals(r1, 0x409, 0x8) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000100)="0e", 0x1}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f00000002c0)}, 0x10) 03:33:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x39) sendfile(r0, r1, &(0x7f0000000000), 0xffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$addseals(r1, 0x409, 0x8) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000100)="0e", 0x1}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f00000002c0)}, 0x10) 03:33:34 executing program 4: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="0153bc6cda8103f0e685"], &(0x7f0000000540)=0x1) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$binfmt_aout(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x177) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) sendfile(r1, r1, &(0x7f00000000c0), 0x8080fffffffe) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000380)="7499b122885472891bfd74575aeb7444ab295b155a310bf321396c30f65651d326052ebb46aefd5c7bdaab4ded01eb70ed8f5cf28247915326f59156d5b34b2021bd33542332ca2248da1cd69a189223d2464795b16747b1d5455a3bda785732e6c2c0c3ed9308d0dd48e4715340e2a9843a4f6db240edf113a53158622c6490314ac2d80cbf04222a6e878e917d867040915e647115397fd017453db906a0dbbc0ffb56060373892817bce22605333e4ca0cb71c2759110df52e89c3d770635a0ba53cd6172bdbd644f06b63232f1f778cf99bd96ae621009532894a0357fbb4010a90727ce8cdeaac3f1b9cbb598eb7759c51448166fad37368bf2ea4a8018") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r2, &(0x7f0000000480), 0x100000000000004f, 0x0) 03:33:34 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x1fffff, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000580)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)=')em0[\x00', 0xffffffffffffff9c}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000880)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in6=@mcast2, @in6=@local}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in6, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000006c0), 0x0, &(0x7f0000000e00)}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000500)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0x4) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000400), &(0x7f00000003c0)=0xffffffffffffffae) getgid() seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000005c0), &(0x7f0000000600)=0x8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000004c0), 0x8) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000300), 0x10) 03:33:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x39) sendfile(r0, r1, &(0x7f0000000000), 0xffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$addseals(r1, 0x409, 0x8) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000100)="0e", 0x1}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f00000002c0)}, 0x10) 03:33:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x39) sendfile(r0, r1, &(0x7f0000000000), 0xffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$addseals(r1, 0x409, 0x8) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000100)="0e", 0x1}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f00000002c0)}, 0x10) 03:33:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x39) sendfile(r0, r1, &(0x7f0000000000), 0xffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$addseals(r1, 0x409, 0x8) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000100)="0e", 0x1}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f00000002c0)}, 0x10) [ 641.729939] FAT-fs (loop4): Unrecognized mount option "Slځ" or missing value 03:33:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x39) sendfile(r0, r1, &(0x7f0000000000), 0xffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$addseals(r1, 0x409, 0x8) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000100)="0e", 0x1}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f00000002c0)}, 0x10) 03:33:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x39) sendfile(r0, r1, &(0x7f0000000000), 0xffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$addseals(r1, 0x409, 0x8) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000100)="0e", 0x1}], 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f00000002c0)}, 0x10) 03:33:35 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)=ANY=[], &(0x7f00000002c0)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000004c0)) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) bind$inet(r1, &(0x7f0000000580)={0x2, 0x104e23, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0a, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000280)={0x0, 0x200, 0x30}, &(0x7f0000000400)=0xc) ioctl$TCGETS(r0, 0x5401, &(0x7f00000000c0)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)="0a5cc80700315f") socket$nl_netfilter(0x10, 0x3, 0xc) 03:33:35 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)=ANY=[], &(0x7f00000002c0)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000004c0)) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) bind$inet(r1, &(0x7f0000000580)={0x2, 0x104e23, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0a, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000280)={0x0, 0x200, 0x30}, &(0x7f0000000400)=0xc) ioctl$TCGETS(r0, 0x5401, &(0x7f00000000c0)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)="0a5cc80700315f") socket$nl_netfilter(0x10, 0x3, 0xc) 03:33:35 executing program 0: clock_gettime(0x8, &(0x7f00000002c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) geteuid() request_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/vcs\x00', 0xfffffffffffffff8) request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f00000006c0)='em0\x00', 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000680)=0xc) getgid() gettid() getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000f00)=""/4096) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000840)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@local, @in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000880)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000008c0)={0x0, @rand_addr, @broadcast}, &(0x7f0000000a80)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b80)={0x0, @dev}, &(0x7f0000000bc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000e80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001f00), &(0x7f0000001f40)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000001f80)=@can, &(0x7f0000002000)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002040)={@loopback}, &(0x7f0000002080)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000020c0), &(0x7f0000002100)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000037c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004940)={0x0, @local, @dev}, &(0x7f0000004980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006f80)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000007080)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000070c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000071c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000072c0)={'vcan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007940)={0x0, @remote, @remote}, &(0x7f0000007980)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000079c0)={0x0, @remote, @broadcast}, &(0x7f0000007a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000007a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007a80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007b00)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@local}}}, &(0x7f0000007c00)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007c80)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000007cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007d00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009f80)={{{@in=@multicast2, @in=@local}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000a080)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000a0c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a100)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000ca00)={{{@in6=@local, @in6=@ipv4={[], [], @dev}}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f000000cb00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000cb40)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f000000d6c0)={&(0x7f0000000140), 0xc, &(0x7f000000d680)={&(0x7f000000cb80)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="f9805da06a0f460f46dc0f01ee263a208600d7cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c43ef0470fbb4000d6adbe90dfe2987e") 03:33:35 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)=ANY=[], &(0x7f00000002c0)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000004c0)) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) bind$inet(r1, &(0x7f0000000580)={0x2, 0x104e23, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0a, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000280)={0x0, 0x200, 0x30}, &(0x7f0000000400)=0xc) ioctl$TCGETS(r0, 0x5401, &(0x7f00000000c0)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)="0a5cc80700315f") socket$nl_netfilter(0x10, 0x3, 0xc) 03:33:35 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="0153bc6cda8103f0e685"], &(0x7f0000000540)=0x1) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$binfmt_aout(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x177) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) sendfile(r1, r1, &(0x7f00000000c0), 0x8080fffffffe) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000380)="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") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r2, &(0x7f0000000480), 0x100000000000004f, 0x0) 03:33:36 executing program 4: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="0153bc6cda8103f0e685"], &(0x7f0000000540)=0x1) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$binfmt_aout(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x177) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) sendfile(r1, r1, &(0x7f00000000c0), 0x8080fffffffe) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000380)="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") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r2, &(0x7f0000000480), 0x100000000000004f, 0x0) 03:33:36 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x1fffff, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000580)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)=')em0[\x00', 0xffffffffffffff9c}, 0x10) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000880)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in6=@mcast2, @in6=@local}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in6, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000006c0), 0x0, &(0x7f0000000e00)}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000500)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0x4) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000400), &(0x7f00000003c0)=0xffffffffffffffae) getgid() seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000005c0), &(0x7f0000000600)=0x8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000004c0), 0x8) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000300), 0x10) 03:33:36 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000180)=0x40000000000074, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)=ANY=[], &(0x7f00000002c0)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000004c0)) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) bind$inet(r1, &(0x7f0000000580)={0x2, 0x104e23, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0a, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000280)={0x0, 0x200, 0x30}, &(0x7f0000000400)=0xc) ioctl$TCGETS(r0, 0x5401, &(0x7f00000000c0)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)="0a5cc80700315f") socket$nl_netfilter(0x10, 0x3, 0xc) 03:33:36 executing program 5: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="0153bc6cda8103f0e685"], &(0x7f0000000540)=0x1) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$binfmt_aout(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="0000000000000000000008000000000000001200001c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2d8fa246a1f22794fbb1ceeb7a53617aad88a58766ded2ad1ca13b12baac4f65470bc2423012c08d72bbd4090349d30f4086cff39c81384bd5d6374c52db8f70f61af7453961f836a472862f832f922a2e34bc9dd6f80cdf9b15060bd1de9e8e4cd5fb1f756a152b6deec52204c02cf0df5cd86471356df771e0624f492d59e6f635b9d90659f6ad461611b1ffc8edd6ac1375a6ef334187a54dd6bafb64bff875164306253783214393211f4602f57dfc94bb4658e4d7671404f2aceed78c8937adf1ebaf9b189a30617ba203f5f402ce3838e232c77703e76d6e681ed905eadf4c120500fc0a6d6347101d3824bb642ecb62972dc4d52d03803d977b15fd1b4defa78528d9628ed89b5057632c092e48c3f8d19f93b831f43f9e8"], 0x177) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) sendfile(r1, r1, &(0x7f00000000c0), 0x8080fffffffe) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000380)="7499b122885472891bfd74575aeb7444ab295b155a310bf321396c30f65651d326052ebb46aefd5c7bdaab4ded01eb70ed8f5cf28247915326f59156d5b34b2021bd33542332ca2248da1cd69a189223d2464795b16747b1d5455a3bda785732e6c2c0c3ed9308d0dd48e4715340e2a9843a4f6db240edf113a53158622c6490314ac2d80cbf04222a6e878e917d867040915e647115397fd017453db906a0dbbc0ffb56060373892817bce22605333e4ca0cb71c2759110df52e89c3d770635a0ba53cd6172bdbd644f06b63232f1f778cf99bd96ae621009532894a0357fbb4010a90727ce8cdeaac3f1b9cbb598eb7759c51448166fad37368bf2ea4a8018") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r2, &(0x7f0000000480), 0x100000000000004f, 0x0) 03:33:36 executing program 5: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="0153bc6cda8103f0e685"], &(0x7f0000000540)=0x1) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$binfmt_aout(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="0000000000000000000008000000000000001200001c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2d8fa246a1f22794fbb1ceeb7a53617aad88a58766ded2ad1ca13b12baac4f65470bc2423012c08d72bbd4090349d30f4086cff39c81384bd5d6374c52db8f70f61af7453961f836a472862f832f922a2e34bc9dd6f80cdf9b15060bd1de9e8e4cd5fb1f756a152b6deec52204c02cf0df5cd86471356df771e0624f492d59e6f635b9d90659f6ad461611b1ffc8edd6ac1375a6ef334187a54dd6bafb64bff875164306253783214393211f4602f57dfc94bb4658e4d7671404f2aceed78c8937adf1ebaf9b189a30617ba203f5f402ce3838e232c77703e76d6e681ed905eadf4c120500fc0a6d6347101d3824bb642ecb62972dc4d52d03803d977b15fd1b4defa78528d9628ed89b5057632c092e48c3f8d19f93b831f43f9e8"], 0x177) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) sendfile(r1, r1, &(0x7f00000000c0), 0x8080fffffffe) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000380)="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") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r2, &(0x7f0000000480), 0x100000000000004f, 0x0) 03:33:36 executing program 5: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="0153bc6cda8103f0e685"], &(0x7f0000000540)=0x1) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$binfmt_aout(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x177) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) sendfile(r1, r1, &(0x7f00000000c0), 0x8080fffffffe) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000380)="7499b122885472891bfd74575aeb7444ab295b155a310bf321396c30f65651d326052ebb46aefd5c7bdaab4ded01eb70ed8f5cf28247915326f59156d5b34b2021bd33542332ca2248da1cd69a189223d2464795b16747b1d5455a3bda785732e6c2c0c3ed9308d0dd48e4715340e2a9843a4f6db240edf113a53158622c6490314ac2d80cbf04222a6e878e917d867040915e647115397fd017453db906a0dbbc0ffb56060373892817bce22605333e4ca0cb71c2759110df52e89c3d770635a0ba53cd6172bdbd644f06b63232f1f778cf99bd96ae621009532894a0357fbb4010a90727ce8cdeaac3f1b9cbb598eb7759c51448166fad37368bf2ea4a8018") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r2, &(0x7f0000000480), 0x100000000000004f, 0x0) 03:33:36 executing program 2: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="0153bc6cda8103f0e685"], &(0x7f0000000540)=0x1) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$binfmt_aout(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x177) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) sendfile(r1, r1, &(0x7f00000000c0), 0x8080fffffffe) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000380)="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") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r2, &(0x7f0000000480), 0x100000000000004f, 0x0) 03:33:36 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="0153bc6cda8103f0e685"], &(0x7f0000000540)=0x1) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$binfmt_aout(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x177) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) sendfile(r1, r1, &(0x7f00000000c0), 0x8080fffffffe) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000380)="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") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r2, &(0x7f0000000480), 0x100000000000004f, 0x0) 03:33:36 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000140)={0x0, 0x2710}, 0x10) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f0000001ec0)=@pppol2tpin6, 0x80, &(0x7f00000022c0)}}], 0x1, 0x0, &(0x7f0000004d80)) 03:33:36 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="0153bc6cda8103f0e685"], &(0x7f0000000540)=0x1) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$binfmt_aout(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="0000000000000000000008000000000000001200001c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2d8fa246a1f22794fbb1ceeb7a53617aad88a58766ded2ad1ca13b12baac4f65470bc2423012c08d72bbd4090349d30f4086cff39c81384bd5d6374c52db8f70f61af7453961f836a472862f832f922a2e34bc9dd6f80cdf9b15060bd1de9e8e4cd5fb1f756a152b6deec52204c02cf0df5cd86471356df771e0624f492d59e6f635b9d90659f6ad461611b1ffc8edd6ac1375a6ef334187a54dd6bafb64bff875164306253783214393211f4602f57dfc94bb4658e4d7671404f2aceed78c8937adf1ebaf9b189a30617ba203f5f402ce3838e232c77703e76d6e681ed905eadf4c120500fc0a6d6347101d3824bb642ecb62972dc4d52d03803d977b15fd1b4defa78528d9628ed89b5057632c092e48c3f8d19f93b831f43f9e8"], 0x177) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) sendfile(r1, r1, &(0x7f00000000c0), 0x8080fffffffe) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000380)="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") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r2, &(0x7f0000000480), 0x100000000000004f, 0x0) 03:33:37 executing program 5: keyctl$set_reqkey_keyring(0x4, 0xfffffffd) add_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x0, 0xfffffffffffffffa) keyctl$setperm(0xa, 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000780)=ANY=[], &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") 03:33:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"7665740000000000fffffffebd6800", 0x43732e5398416f1a}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000002c0), &(0x7f0000000300)=0x4) close(r0) [ 643.922700] FAT-fs (loop0): error, invalid access to FAT (entry 0x000001c3) [ 643.959668] FAT-fs (loop0): Filesystem has been set read-only [ 643.988028] FAT-fs (loop0): error, invalid access to FAT (entry 0x000001c3) 03:33:37 executing program 4: io_setup(0x1, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) getpeername(0xffffffffffffff9c, &(0x7f0000000600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000680)=0x80) dup2(0xffffffffffffff9c, 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/ppp\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000840)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000ac0)='/proc/self/net/pfkey\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000000b40)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) inotify_init1(0x0) prctl$void(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=@fragment, 0x8) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000440)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000100), &(0x7f0000000140)='nodev\x00', 0xfffffffffffffffd) clock_adjtime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 644.054039] FAT-fs (loop0): error, invalid access to FAT (entry 0x000001c3) [ 644.094143] FAT-fs (loop0): error, invalid access to FAT (entry 0x000001c3) 03:33:37 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="0153bc6cda8103f0e685"], &(0x7f0000000540)=0x1) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$binfmt_aout(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x177) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) sendfile(r1, r1, &(0x7f00000000c0), 0x8080fffffffe) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000380)="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") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r2, &(0x7f0000000480), 0x100000000000004f, 0x0) 03:33:37 executing program 2: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="0153bc6cda8103f0e685"], &(0x7f0000000540)=0x1) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$binfmt_aout(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x177) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) sendfile(r1, r1, &(0x7f00000000c0), 0x8080fffffffe) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000380)="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") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r2, &(0x7f0000000480), 0x100000000000004f, 0x0) 03:33:37 executing program 1: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="0153bc6cda8103f0e685"], &(0x7f0000000540)=0x1) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$binfmt_aout(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="0000000000000000000008000000000000001200001c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab8c0d7de02d9bf774a2d8fa246a1f22794fbb1ceeb7a53617aad88a58766ded2ad1ca13b12baac4f65470bc2423012c08d72bbd4090349d30f4086cff39c81384bd5d6374c52db8f70f61af7453961f836a472862f832f922a2e34bc9dd6f80cdf9b15060bd1de9e8e4cd5fb1f756a152b6deec52204c02cf0df5cd86471356df771e0624f492d59e6f635b9d90659f6ad461611b1ffc8edd6ac1375a6ef334187a54dd6bafb64bff875164306253783214393211f4602f57dfc94bb4658e4d7671404f2aceed78c8937adf1ebaf9b189a30617ba203f5f402ce3838e232c77703e76d6e681ed905eadf4c120500fc0a6d6347101d3824bb642ecb62972dc4d52d03803d977b15fd1b4defa78528d9628ed89b5057632c092e48c3f8d19f93b831f43f9e8"], 0x177) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) sendfile(r1, r1, &(0x7f00000000c0), 0x8080fffffffe) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000380)="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") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r2, &(0x7f0000000480), 0x100000000000004f, 0x0) 03:33:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"7665740000000000fffffffebd6800", 0x43732e5398416f1a}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000002c0), &(0x7f0000000300)=0x4) close(r0) 03:33:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"7665740000000000fffffffebd6800", 0x43732e5398416f1a}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000002c0), &(0x7f0000000300)=0x4) close(r0) 03:33:39 executing program 2: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="0153bc6cda8103f0e685"], &(0x7f0000000540)=0x1) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$binfmt_aout(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x177) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) sendfile(r1, r1, &(0x7f00000000c0), 0x8080fffffffe) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000380)="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") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r2, &(0x7f0000000480), 0x100000000000004f, 0x0) 03:33:39 executing program 4: io_setup(0x1, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) getpeername(0xffffffffffffff9c, &(0x7f0000000600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000680)=0x80) dup2(0xffffffffffffff9c, 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/ppp\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000840)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000ac0)='/proc/self/net/pfkey\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000000b40)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) inotify_init1(0x0) prctl$void(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=@fragment, 0x8) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000440)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000100), &(0x7f0000000140)='nodev\x00', 0xfffffffffffffffd) clock_adjtime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:39 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="0153bc6cda8103f0e685"], &(0x7f0000000540)=0x1) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) write$binfmt_aout(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x177) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) sendfile(r1, r1, &(0x7f00000000c0), 0x8080fffffffe) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000380)="7499b122885472891bfd74575aeb7444ab295b155a310bf321396c30f65651d326052ebb46aefd5c7bdaab4ded01eb70ed8f5cf28247915326f59156d5b34b2021bd33542332ca2248da1cd69a189223d2464795b16747b1d5455a3bda785732e6c2c0c3ed9308d0dd48e4715340e2a9843a4f6db240edf113a53158622c6490314ac2d80cbf04222a6e878e917d867040915e647115397fd017453db906a0dbbc0ffb56060373892817bce22605333e4ca0cb71c2759110df52e89c3d770635a0ba53cd6172bdbd644f06b63232f1f778cf99bd96ae621009532894a0357fbb4010a90727ce8cdeaac3f1b9cbb598eb7759c51448166fad37368bf2ea4a8018") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r2, &(0x7f0000000480), 0x100000000000004f, 0x0) 03:33:39 executing program 1: clock_gettime(0x20020027, &(0x7f00000005c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000700)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001bc0)) fstat(0xffffffffffffffff, &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000000240)=0xfc5c) getpid() stat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000000a000), &(0x7f0000009fc0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e80)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@rand_addr}}, &(0x7f0000001f80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001fc0)) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgroups(0x0, &(0x7f0000002880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000028c0), &(0x7f0000002900)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002940)={{{@in6=@mcast1, @in=@multicast2}}, {{}, 0x0, @in6=@local}}, &(0x7f0000002a40)=0xe8) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006fc0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f00000070c0)=0xe8) getgroups(0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000380)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000280)=0xfed7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") [ 645.860021] FAT-fs (loop2): Unrecognized mount option "Slځ" or missing value 03:33:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"7665740000000000fffffffebd6800", 0x43732e5398416f1a}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000002c0), &(0x7f0000000300)=0x4) close(r0) 03:33:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) connect$vsock_dgram(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my}, 0x10) 03:33:40 executing program 4: io_setup(0x1, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) getpeername(0xffffffffffffff9c, &(0x7f0000000600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000680)=0x80) dup2(0xffffffffffffff9c, 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/ppp\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000840)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000ac0)='/proc/self/net/pfkey\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000000b40)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) inotify_init1(0x0) prctl$void(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=@fragment, 0x8) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000440)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000100), &(0x7f0000000140)='nodev\x00', 0xfffffffffffffffd) clock_adjtime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:40 executing program 1: clock_gettime(0x20020027, &(0x7f00000005c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000700)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001bc0)) fstat(0xffffffffffffffff, &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000000240)=0xfc5c) getpid() stat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000000a000), &(0x7f0000009fc0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e80)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@rand_addr}}, &(0x7f0000001f80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001fc0)) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgroups(0x0, &(0x7f0000002880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000028c0), &(0x7f0000002900)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002940)={{{@in6=@mcast1, @in=@multicast2}}, {{}, 0x0, @in6=@local}}, &(0x7f0000002a40)=0xe8) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006fc0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f00000070c0)=0xe8) getgroups(0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000380)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000280)=0xfed7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:40 executing program 2: clock_gettime(0x1, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000002c0)={'TPROXY\x00'}, &(0x7f0000000300)=0x1e) clock_gettime(0x0, &(0x7f0000000280)) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040), 0x4) syz_genetlink_get_family_id$fou(&(0x7f0000000380)='fou\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340), 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") prctl$setendian(0x14, 0x0) pipe2(&(0x7f0000000140), 0x0) sysfs$1(0x1, &(0x7f00000001c0)='selfvmnet0-uservmnet1\x00') ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000200)) 03:33:40 executing program 0: mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) accept(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000040)=0x80) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400), 0x0, 0x0, 0xfffffffffffffffa) msgget(0xffffffffffffffff, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@mcast2, @in=@dev}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000980)={{&(0x7f0000000900)=""/46, 0x2e}, &(0x7f0000000940)}, 0x20) getpgid(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000840)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000880)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) keyctl$setperm(0x5, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000340)='lo\x00', 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000380), 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280), &(0x7f00000002c0)=0x20) sysfs$1(0x1, &(0x7f00000000c0)='trusted.overlay.upper\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000540)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=@setneightbl={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") [ 646.994384] IPVS: ftp: loaded support on port[0] = 21 03:33:40 executing program 1: clock_gettime(0x20020027, &(0x7f00000005c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000700)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001bc0)) fstat(0xffffffffffffffff, &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000000240)=0xfc5c) getpid() stat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000000a000), &(0x7f0000009fc0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e80)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@rand_addr}}, &(0x7f0000001f80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001fc0)) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgroups(0x0, &(0x7f0000002880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000028c0), &(0x7f0000002900)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002940)={{{@in6=@mcast1, @in=@multicast2}}, {{}, 0x0, @in6=@local}}, &(0x7f0000002a40)=0xe8) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006fc0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f00000070c0)=0xe8) getgroups(0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000380)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000280)=0xfed7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:41 executing program 4: io_setup(0x1, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) getpeername(0xffffffffffffff9c, &(0x7f0000000600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000680)=0x80) dup2(0xffffffffffffff9c, 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/ppp\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000840)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000ac0)='/proc/self/net/pfkey\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000000b40)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) inotify_init1(0x0) prctl$void(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=@fragment, 0x8) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000440)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f000045fff8)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000100), &(0x7f0000000140)='nodev\x00', 0xfffffffffffffffd) clock_adjtime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:41 executing program 2: clock_gettime(0x1, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000002c0)={'TPROXY\x00'}, &(0x7f0000000300)=0x1e) clock_gettime(0x0, &(0x7f0000000280)) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040), 0x4) syz_genetlink_get_family_id$fou(&(0x7f0000000380)='fou\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340), 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") prctl$setendian(0x14, 0x0) pipe2(&(0x7f0000000140), 0x0) sysfs$1(0x1, &(0x7f00000001c0)='selfvmnet0-uservmnet1\x00') ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000200)) 03:33:41 executing program 0: mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) accept(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000040)=0x80) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400), 0x0, 0x0, 0xfffffffffffffffa) msgget(0xffffffffffffffff, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@mcast2, @in=@dev}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000980)={{&(0x7f0000000900)=""/46, 0x2e}, &(0x7f0000000940)}, 0x20) getpgid(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000840)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000880)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) keyctl$setperm(0x5, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000340)='lo\x00', 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000380), 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280), &(0x7f00000002c0)=0x20) sysfs$1(0x1, &(0x7f00000000c0)='trusted.overlay.upper\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000540)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=@setneightbl={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 03:33:41 executing program 3: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xf) clock_gettime(0x0, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f0000000140)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.type\x00', 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000e00)=ANY=[], 0x0) clock_gettime(0x0, &(0x7f0000000800)) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f0000000840)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6f20f477704c4010d64ac1e5d31a3b7e2bd9f7f") io_setup(0x0, &(0x7f0000000e80)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) io_pgetevents(0x0, 0x0, 0x0, &(0x7f0000000640), &(0x7f0000000ec0)={0x0, 0x989680}, &(0x7f0000000780)={&(0x7f0000000740), 0x8}) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f0000000340)) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000e40)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180), 0x10) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) eventfd(0x0) rseq(&(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)}, 0x20, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000640)) 03:33:41 executing program 1: clock_gettime(0x20020027, &(0x7f00000005c0)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}}, &(0x7f0000000580)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000140)) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000700)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001bc0)) fstat(0xffffffffffffffff, &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000000240)=0xfc5c) getpid() stat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000000a000), &(0x7f0000009fc0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001e40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e80)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@rand_addr}}, &(0x7f0000001f80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001fc0)) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgroups(0x0, &(0x7f0000002880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000028c0), &(0x7f0000002900)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002940)={{{@in6=@mcast1, @in=@multicast2}}, {{}, 0x0, @in6=@local}}, &(0x7f0000002a40)=0xe8) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006fc0)={{{@in6=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f00000070c0)=0xe8) getgroups(0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000380)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000280)=0xfed7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:42 executing program 2: clock_gettime(0x1, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000002c0)={'TPROXY\x00'}, &(0x7f0000000300)=0x1e) clock_gettime(0x0, &(0x7f0000000280)) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040), 0x4) syz_genetlink_get_family_id$fou(&(0x7f0000000380)='fou\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340), 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") prctl$setendian(0x14, 0x0) pipe2(&(0x7f0000000140), 0x0) sysfs$1(0x1, &(0x7f00000001c0)='selfvmnet0-uservmnet1\x00') ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000200)) [ 650.466924] bridge0: port 1(bridge_slave_0) entered blocking state [ 650.473468] bridge0: port 1(bridge_slave_0) entered disabled state [ 650.480478] device bridge_slave_0 entered promiscuous mode [ 650.566388] bridge0: port 2(bridge_slave_1) entered blocking state [ 650.573497] bridge0: port 2(bridge_slave_1) entered disabled state [ 650.583457] device bridge_slave_1 entered promiscuous mode [ 650.610659] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 650.656052] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 650.772610] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 650.817315] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 651.076830] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 651.084236] team0: Port device team_slave_0 added [ 651.109275] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 651.116996] team0: Port device team_slave_1 added [ 651.178870] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 651.254758] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 651.261631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 651.271322] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 651.347441] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 651.354551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 651.362901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 651.423694] device bridge_slave_1 left promiscuous mode [ 651.429792] bridge0: port 2(bridge_slave_1) entered disabled state [ 651.482911] device bridge_slave_0 left promiscuous mode [ 651.488361] bridge0: port 1(bridge_slave_0) entered disabled state [ 653.460004] team0 (unregistering): Port device team_slave_1 removed [ 653.470035] team0 (unregistering): Port device team_slave_0 removed [ 653.480959] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 653.522414] device bond_slave_1 left promiscuous mode [ 653.531042] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 653.562637] device bond_slave_0 left promiscuous mode [ 653.589983] bond0 (unregistering): Released all slaves [ 653.648516] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 653.656075] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 653.665220] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 654.022375] bridge0: port 2(bridge_slave_1) entered blocking state [ 654.028765] bridge0: port 2(bridge_slave_1) entered forwarding state [ 654.035535] bridge0: port 1(bridge_slave_0) entered blocking state [ 654.041917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 654.050518] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 654.666505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 655.534866] 8021q: adding VLAN 0 to HW filter on device bond0 [ 655.620232] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 655.704981] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 655.711109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 655.719707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 655.805909] 8021q: adding VLAN 0 to HW filter on device team0 03:33:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) connect$vsock_dgram(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my}, 0x10) 03:33:49 executing program 0: mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) accept(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000040)=0x80) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400), 0x0, 0x0, 0xfffffffffffffffa) msgget(0xffffffffffffffff, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@mcast2, @in=@dev}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000980)={{&(0x7f0000000900)=""/46, 0x2e}, &(0x7f0000000940)}, 0x20) getpgid(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000840)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000880)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) keyctl$setperm(0x5, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000340)='lo\x00', 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000380), 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280), &(0x7f00000002c0)=0x20) sysfs$1(0x1, &(0x7f00000000c0)='trusted.overlay.upper\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000540)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=@setneightbl={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 03:33:49 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r1, &(0x7f00000002c0)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000780)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f0000000200)="96", 0x1, 0x4001, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f0000266ffc)=0x800, 0x4) recvmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000080)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000000300)=""/137, 0x89}], 0x1, &(0x7f0000000280)=""/38, 0x26}, 0x0) 03:33:49 executing program 3: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xf) clock_gettime(0x0, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f0000000140)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.type\x00', 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000e00)=ANY=[], 0x0) clock_gettime(0x0, &(0x7f0000000800)) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f0000000840)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6f20f477704c4010d64ac1e5d31a3b7e2bd9f7f") io_setup(0x0, &(0x7f0000000e80)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) io_pgetevents(0x0, 0x0, 0x0, &(0x7f0000000640), &(0x7f0000000ec0)={0x0, 0x989680}, &(0x7f0000000780)={&(0x7f0000000740), 0x8}) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f0000000340)) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000e40)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180), 0x10) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) eventfd(0x0) rseq(&(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)}, 0x20, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000640)) 03:33:49 executing program 1: mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) eventfd2(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_procfs(0x0, &(0x7f0000000140)='uid_map\x00') shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/189) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180), &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000200), 0x8) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000240)) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000380)=ANY=[]) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x3}}}}}}, &(0x7f0000000040)) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") accept4$unix(0xffffffffffffffff, &(0x7f0000000200)=@abs, &(0x7f0000000280)=0x6e, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000480)=0xe8) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getresgid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) 03:33:49 executing program 2: clock_gettime(0x1, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000002c0)={'TPROXY\x00'}, &(0x7f0000000300)=0x1e) clock_gettime(0x0, &(0x7f0000000280)) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040), 0x4) syz_genetlink_get_family_id$fou(&(0x7f0000000380)='fou\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340), 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") prctl$setendian(0x14, 0x0) pipe2(&(0x7f0000000140), 0x0) sysfs$1(0x1, &(0x7f00000001c0)='selfvmnet0-uservmnet1\x00') ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000200)) 03:33:49 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r1, &(0x7f00000002c0)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000780)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f0000000200)="96", 0x1, 0x4001, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f0000266ffc)=0x800, 0x4) recvmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000080)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000000300)=""/137, 0x89}], 0x1, &(0x7f0000000280)=""/38, 0x26}, 0x0) 03:33:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) connect$vsock_dgram(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my}, 0x10) 03:33:49 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r1, &(0x7f00000002c0)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000780)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f0000000200)="96", 0x1, 0x4001, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f0000266ffc)=0x800, 0x4) recvmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000080)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000000300)=""/137, 0x89}], 0x1, &(0x7f0000000280)=""/38, 0x26}, 0x0) 03:33:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) connect$vsock_dgram(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my}, 0x10) 03:33:50 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r1, &(0x7f00000002c0)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000780)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f0000000200)="96", 0x1, 0x4001, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f0000266ffc)=0x800, 0x4) recvmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000080)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000000300)=""/137, 0x89}], 0x1, &(0x7f0000000280)=""/38, 0x26}, 0x0) 03:33:50 executing program 5: clock_gettime(0x4, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000280)) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000002c0)=""/196, 0xc4, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:50 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) memfd_create(&(0x7f0000000040)=',\x00', 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000000c0)=""/39, &(0x7f0000000140)=0x27) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:50 executing program 3: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xf) clock_gettime(0x0, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f0000000140)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.type\x00', 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000e00)=ANY=[], 0x0) clock_gettime(0x0, &(0x7f0000000800)) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f0000000840)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6f20f477704c4010d64ac1e5d31a3b7e2bd9f7f") io_setup(0x0, &(0x7f0000000e80)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) io_pgetevents(0x0, 0x0, 0x0, &(0x7f0000000640), &(0x7f0000000ec0)={0x0, 0x989680}, &(0x7f0000000780)={&(0x7f0000000740), 0x8}) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f0000000340)) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000e40)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180), 0x10) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) eventfd(0x0) rseq(&(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)}, 0x20, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000640)) 03:33:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0xb, 0x82000, 0x100000001, 0x1, 0xffffffffffffffff, 0x0, [0x5f]}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f00000001c0), &(0x7f00000000c0)}, 0x20) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000100), &(0x7f00000000c0)}, 0x20) 03:33:50 executing program 0: mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) accept(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000040)=0x80) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400), 0x0, 0x0, 0xfffffffffffffffa) msgget(0xffffffffffffffff, 0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@mcast2, @in=@dev}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000980)={{&(0x7f0000000900)=""/46, 0x2e}, &(0x7f0000000940)}, 0x20) getpgid(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000840)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000880)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) keyctl$setperm(0x5, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000340)='lo\x00', 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000380), 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280), &(0x7f00000002c0)=0x20) sysfs$1(0x1, &(0x7f00000000c0)='trusted.overlay.upper\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000540)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=@setneightbl={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 03:33:50 executing program 1: mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) eventfd2(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_procfs(0x0, &(0x7f0000000140)='uid_map\x00') shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/189) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180), &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000200), 0x8) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000240)) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000380)=ANY=[]) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x3}}}}}}, &(0x7f0000000040)) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") accept4$unix(0xffffffffffffffff, &(0x7f0000000200)=@abs, &(0x7f0000000280)=0x6e, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000480)=0xe8) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getresgid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) 03:33:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0xb, 0x82000, 0x100000001, 0x1, 0xffffffffffffffff, 0x0, [0x5f]}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f00000001c0), &(0x7f00000000c0)}, 0x20) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000100), &(0x7f00000000c0)}, 0x20) 03:33:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0xb, 0x82000, 0x100000001, 0x1, 0xffffffffffffffff, 0x0, [0x5f]}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f00000001c0), &(0x7f00000000c0)}, 0x20) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000100), &(0x7f00000000c0)}, 0x20) 03:33:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0xb, 0x82000, 0x100000001, 0x1, 0xffffffffffffffff, 0x0, [0x5f]}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f00000001c0), &(0x7f00000000c0)}, 0x20) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000100), &(0x7f00000000c0)}, 0x20) 03:33:51 executing program 5: clock_gettime(0x4, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000280)) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000002c0)=""/196, 0xc4, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:51 executing program 2: r0 = socket(0x400000000010, 0x2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000280)) sendmsg$unix(r1, &(0x7f0000001640)={&(0x7f00000002c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000015c0)=[{&(0x7f0000001580)="f18a51a7c171e791", 0x8}], 0x1, &(0x7f0000001780)=ANY=[@ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2], 0x20, 0x40000}, 0x80) openat$cgroup_procs(r1, &(0x7f00000016c0)='cgroup.procs\x00', 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x4565f66e0fd75387, &(0x7f0000000200)=0x4, 0xfffffffffffffe87) unshare(0x40000000) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x0, 0x2000}, 0x4) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xabfe, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) clock_gettime(0x8000000000, &(0x7f0000000340)) socket$packet(0x11, 0x1, 0x300) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100}) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020203000000100f020ee1000c08000b0000000000", 0x24) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000100)={0x22, 0x27, 0x12, 0xb, 0x8, 0x3, 0x1, 0xae, 0xffffffffffffffff}) sendto$inet6(r3, &(0x7f0000000380)="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", 0x1000, 0x4048000, 0x0, 0x0) [ 658.035646] IPVS: ftp: loaded support on port[0] = 21 03:33:51 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) memfd_create(&(0x7f0000000040)=',\x00', 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000000c0)=""/39, &(0x7f0000000140)=0x27) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:51 executing program 3: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xf) clock_gettime(0x0, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f0000000140)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.type\x00', 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000e00)=ANY=[], 0x0) clock_gettime(0x0, &(0x7f0000000800)) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, &(0x7f0000000840)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6f20f477704c4010d64ac1e5d31a3b7e2bd9f7f") io_setup(0x0, &(0x7f0000000e80)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) io_pgetevents(0x0, 0x0, 0x0, &(0x7f0000000640), &(0x7f0000000ec0)={0x0, 0x989680}, &(0x7f0000000780)={&(0x7f0000000740), 0x8}) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f0000000340)) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000004c0)={0xa0}, 0xa0) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000e40)) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180), 0x10) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) eventfd(0x0) rseq(&(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)}, 0x20, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000640)) 03:33:51 executing program 0: shmget$private(0x0, 0xfffffffffeffffff, 0x0, &(0x7f0000ffb000/0x3000)=nil) 03:33:51 executing program 1: mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) eventfd2(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_procfs(0x0, &(0x7f0000000140)='uid_map\x00') shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/189) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180), &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000200), 0x8) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000240)) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000380)=ANY=[]) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x3}}}}}}, &(0x7f0000000040)) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") accept4$unix(0xffffffffffffffff, &(0x7f0000000200)=@abs, &(0x7f0000000280)=0x6e, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000480)=0xe8) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getresgid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) [ 658.440883] IPVS: ftp: loaded support on port[0] = 21 03:33:51 executing program 2: r0 = socket(0x400000000010, 0x2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000280)) sendmsg$unix(r1, &(0x7f0000001640)={&(0x7f00000002c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000015c0)=[{&(0x7f0000001580)="f18a51a7c171e791", 0x8}], 0x1, &(0x7f0000001780)=ANY=[@ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2], 0x20, 0x40000}, 0x80) openat$cgroup_procs(r1, &(0x7f00000016c0)='cgroup.procs\x00', 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x4565f66e0fd75387, &(0x7f0000000200)=0x4, 0xfffffffffffffe87) unshare(0x40000000) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x0, 0x2000}, 0x4) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xabfe, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) clock_gettime(0x8000000000, &(0x7f0000000340)) socket$packet(0x11, 0x1, 0x300) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100}) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020203000000100f020ee1000c08000b0000000000", 0x24) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000100)={0x22, 0x27, 0x12, 0xb, 0x8, 0x3, 0x1, 0xae, 0xffffffffffffffff}) sendto$inet6(r3, &(0x7f0000000380)="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", 0x1000, 0x4048000, 0x0, 0x0) [ 658.627675] IPVS: ftp: loaded support on port[0] = 21 03:33:52 executing program 0: shmget$private(0x0, 0xfffffffffeffffff, 0x0, &(0x7f0000ffb000/0x3000)=nil) 03:33:52 executing program 5: clock_gettime(0x4, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000280)) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000002c0)=""/196, 0xc4, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:52 executing program 0: shmget$private(0x0, 0xfffffffffeffffff, 0x0, &(0x7f0000ffb000/0x3000)=nil) 03:33:52 executing program 2: r0 = socket(0x400000000010, 0x2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000280)) sendmsg$unix(r1, &(0x7f0000001640)={&(0x7f00000002c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000015c0)=[{&(0x7f0000001580)="f18a51a7c171e791", 0x8}], 0x1, &(0x7f0000001780)=ANY=[@ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2], 0x20, 0x40000}, 0x80) openat$cgroup_procs(r1, &(0x7f00000016c0)='cgroup.procs\x00', 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x4565f66e0fd75387, &(0x7f0000000200)=0x4, 0xfffffffffffffe87) unshare(0x40000000) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x0, 0x2000}, 0x4) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xabfe, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) clock_gettime(0x8000000000, &(0x7f0000000340)) socket$packet(0x11, 0x1, 0x300) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100}) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020203000000100f020ee1000c08000b0000000000", 0x24) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000100)={0x22, 0x27, 0x12, 0xb, 0x8, 0x3, 0x1, 0xae, 0xffffffffffffffff}) sendto$inet6(r3, &(0x7f0000000380)="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", 0x1000, 0x4048000, 0x0, 0x0) 03:33:52 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) memfd_create(&(0x7f0000000040)=',\x00', 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000000c0)=""/39, &(0x7f0000000140)=0x27) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:52 executing program 3: r0 = socket(0x400000000010, 0x2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000280)) sendmsg$unix(r1, &(0x7f0000001640)={&(0x7f00000002c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000015c0)=[{&(0x7f0000001580)="f18a51a7c171e791", 0x8}], 0x1, &(0x7f0000001780)=ANY=[@ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2], 0x20, 0x40000}, 0x80) openat$cgroup_procs(r1, &(0x7f00000016c0)='cgroup.procs\x00', 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x4565f66e0fd75387, &(0x7f0000000200)=0x4, 0xfffffffffffffe87) unshare(0x40000000) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x0, 0x2000}, 0x4) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xabfe, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) clock_gettime(0x8000000000, &(0x7f0000000340)) socket$packet(0x11, 0x1, 0x300) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100}) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020203000000100f020ee1000c08000b0000000000", 0x24) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000100)={0x22, 0x27, 0x12, 0xb, 0x8, 0x3, 0x1, 0xae, 0xffffffffffffffff}) sendto$inet6(r3, &(0x7f0000000380)="820c1d3c8ef1a26859c5bafebf13e73445ae35da26682d7f5238a670c8df5d6981f96ed18677db7e19002ca3e7f56105474d3568c2ff31698057ed9dc66588d5c3b0bcbe64fe58adc6afeb06521e5cfd7d7adb1bd7b1f884d2ff33c68e6aa71582973213534ead35039c22ddd4fd236034a0886e86a676f860db40b13ae7c98aaeefdb3e092cc6a525bdcd909ffb4984a3e93a71688deb8c0b16c79231cd3a38be238027818e077febeb921c01dc08d40730cead2d02d24dfef9b66dd274df088eb9bd128e5dc4582c9b6fe6eb74df9ae2256746e850a7efa2ce3f4cc2df462bb5f332a18706619318d7aff59b0e4281b9c7de5aed6635dc37a98772b56d9e96d2b9c5659d40442346233a6ba763e77717f1424da477f2ff742f305aa25d7c68af341857867519e22664fa4463a608519382157c035fef8470aeca4dff01502436ff158cabf800b9f69fa26ecdaf40444c1d879c2a6dfa345db68835b8bdb8c3491f101b0d0acc10093698e9c5dfee3ad0d8c1536edc742d6adae7affb326615bdb5191fcbc335feb291ed72b434c7c191730884628f2160ca893e89413007472647767ce9386a06fa5f5f6ec0df7c0257146f0ab3ec671cc60b0903e829976b75c02f748f441524e0685fcc865918377058027ffbcecfa29744cf4bcf24325bc93323ea1e2b1d3d7250dff2e31d2c564b65886148d0d26c7af7cddcc8b065a1b67a68a3cb1339dd1ca589613887b819acc7862f1b3bb57b913e23f5fc160eb65db88f1c729facae15bb81057ce9d4411a9f8cc1962ebb5f040c37367a8f8721d87596d67ac1e3694037c93c39ba93eef26fb66175729cc0193688b8500388c350695a158dccd553f917b54749a0f2fd717ff936843b8a1f49afa660c8234970343ea947ca4a5a8d2e967dcea45d37ae62f21edb1efd2db6569f2fb4d73d098b714d326c82ba3de80fb69091a79e2e84c102634d2de1bc3c052d26edd868f4ff998a27c35861216bb8e9e9dd000c8acc0bfe2eb61a063c76ff201a9ab350e3c6264c960cacc274f56065d46e4618a9d64503a58b7709b729533ae310bf1e56ea7acb8c0aef4f4fbd580c14ceb9d1856cd1842895a59e6037d6d3135bd6189046d26ada158de094e11700250e6adbb1f1dbc4fe786c1a8f4f7d550743e4c21489354d4113c7f8c2d336b402d245bc1041e8b6d0833db09d1b13c7aa7fa9d85066a8b7d553a1b995e3e453a2301b377aa0b593b7fe8d80cb4983297258a5c609a2328ad680ac9e1db08343f40a06d074dcf249baada7bacfcb3cf8e47cd0f5826eae787fcad41fb62355f90efc63188156a8f8e95cd97cee9a9e97eb494e5f6178a4d21d7058faf2c5739e16ecccc7a2c4d75bdd959fcd8e8b45a098e41067224782241ef9795005ef07ec93cece7a11753a2fd1f89ccd223f7f9fee169f4d60cf1dbb808ec3e110b189b2a8a4ef3c20aefee9d640f6576c15c8610ffdf8513cfb2d01f8b8d9bbc2419f369f9ab4ef4f009ed5ead6e35c832c26e64bf5329d377a24feaf1ca38a5701a05c47eb60101960efbdae89e399653ccb0391ca83aa5dc7bc505a9b96768dbac09c29e30662f1fd2e2fe7f08f5635272207499e462aedd85844af299d3a2fe005052eee4179072441be4b6daf67fd22bdbb7a6f998df24c528820356e8a23100305341d3764e474dd64d9f43d70e0d05adeb15effecdcd2c0030e7729afd0e8b253df35e9415dd3f79d08a1ace2193c751afede0f1537d60281a3a8e0fa5bbd22c26f3d424816843aa0003df6a7065c8e37a16a0bd80582c36d9b54b3dab632f5103096b4cdd221d18009ae707f1e16dfaf9f810ce33bba3825ad2fa117c225feb13f1009821e48f95cb713bf1631c162bad053ea98b6764c35e196985852e391fa55910ddb737c7ec98a27265bb4aa3c846d0609b6fb932c7cc79ed93357bd49dfd24a9b09172f4ce4e6003af7ad638ed4f800fb97a8c367084475d124384d274815b47af81cc99d57bc1c432c89ad350c4813b156033c7182d21265723b34d6bf8ebf2baacfda03220c5de50ca537d8ad84def687ca8c2cb3b87aaed254c424fc0ecd957a8c916677019bf8f4f9541225ab84fbf2e3905dce1eb440c9939d806a2405af83f22a20bc2f4b62b0c597b5063f3f32c4b6c4fdb96bd45cadcb5c559d3304838d2fae7badca75d1a17454cae1597ff6154676f3eff161a8634591b4f59c6c49afa7131616bb4cfc30a307c597964f772bc9a06d17553164c40539aef5889fcdfc0ef0a61e2e7e64ba97d1837f11f4df6dab9138fe584d08360d3d5de5285c422965fa7d03bcbdf546481f1e58dcca9cd8044431459dc0bbfc394d9a2e6eacef4b98479951de28d154505e33733d4851b17240c84c7460a79a2e290a7df7a923cbb7f2fa1f0cb6accaae0737688a116a89728b2b5ebea3d372c666d301908b40e885f9bb13a347d1e4fa76cc6d9b54f88352e5d616a09fd528d5fe5a4013edfd0317244fa83bce1c3dec5058fbdabe93a1d044b340f29dd586c0c89dea2476a416389428d6aea8453c7e253a07fc33f16060efb18925f325a18927a8a91642c053e93d14fc909d44c29fbbabb2d4ab828086aa95b9be9c4658edc5ca34d4d8978db004416d554cd86b2094704f609477d37fd15d4272e1581aec8ce1b415c5c2b18f7c1241adc8cd274cecedfd66353f7ee39d1f2a325ed5b76c47d15d68e64dba20fda0e9585cd6ecbe9b076a815945a6c2e47c7ae876802438e25988054b24c52ef10a52739abb5b456bae778301601f5fe36ec1bde5ea0387f7e60ab3251a81b9be70125ef89a81d6543bcb028c23e9acec010088746c0a3122bee222154c144def3d9332e4cc5ed50b0ba254c544003f88a722bba0405771c310e6ba0569627cd467c09ed7a97bbd987522c91afe6fa36547e1515d7b9901a22148d592ae7df1c666b3251de81ff69b4c542d1235a4e4460b32b1d167d85f2026d0b8842f75aba667c405214d0befa3cc0974079d4e52adbdac42b1faa3c77631a454e322a781fa7e27b84382cd6fb76e3a340cdb0827836b03a3552b13b800e28969b0e5e792fab3db772f8f78be32df68ade012175b8d15f61abd21dc266d90900a4e5553966803aaf94c3117f5bb616b7ce4b9cf5666ef62a07cd1c999a250d6d3c62ac519dce62b7fb22c3223a650c3d44ffd1ec6ea030dd219f5d3cf7082a978f2d7bb30453edf295ac9bc696495fb2a74c6bf55153cb1f3d97ffa88df89024b7891fbf33aa8b4d9686bee5fa92b9af8258fdbeda8322563714970e2919a06ad090383685f79eb2823417510cd10bd9dcd150163c8dc0752fa45be1d50dc60422b154cc933ef4701cd0e5429b71b008f4b2600b95fe75961dba80dd48c8ef080191ed6e27b846c5588ee78c9017d2ed7454482963384a41bdde50cf51860857df560c4453c7ffca1e817cbce64b3b735ec316b9227b37278bd877d3e8967b341446ec31b9cfb6a43f328427097bcf1258222d425f4aa758b52671ea4d77077303f96484c68a89d2b6da31db5879fb70c13450e623907198a546a987af504b9aa22091e1c67d35c6aa806b36fd7db0302be989aa0acc02656a97f019fc3ed9a464e39f4b05f68b04caf35c46636570c03ab97f0df62fb669ac36bf2e646b3dec013a748995dba901dfef320c51d5c9c93d1f2af7069600260942e7297cfaf32d2eae263f1a05b0fec1e591bca28f33126872c55d57056abe741258017399ed606f8ada3d4211f85300b5666a64aae570b7f88c23b295cd6c9d022ef1aeb4a53c086c23549fde6a9c103fcdba8426d8e97b399440a516e31cd09c077ecf5346b3b6561dc12f9ebb994c5c976210b93dbbbde92c071d9493e1c3e97efb8a23b10d54729a3cfa41c62b80e20d6d51212a4830b47bdccb76c4bf356815c1e97100967f1fbd70816157e481acd29ca595db199bd3965ab325dee198b842d200068e55257122f02a357b97387c174bc012e6a7f001e8f5aa0c2092d1d78ce66b60d2bd32e70b0cdc68d7b19c6f68f99370a882ebd326d339d6b8caa12d2c39047c7d58f6a8c23f4ae49895c295197d72dcad9a798aa37792d514ee96b19e2fb532b3ea9b7821f8f7e242f135330842a42d496fb95d49a4b074682f77a7c39f741505c610e02f121b41484f90a4632bc2aa8e821d58726fd260439a307c11a2c85a3afb9ac006278fa996ffedc5de92e07f5c4b661651b3bf9524d943cd39d03affb14f5d9b4753bf5459fc60ab660f136d0135519c9bfd7534837409d1b15ee35979099e3cf8df94cb40e330b2250c0d24e46f5985d8dfebc898d3cd0970cb2310c9ef607815501a79da1e142cef5c4ddf18d67742c3723ad18e20cdaa6664c2c795ea915486af8033ded77d03b2d55066d1a3e193dd3ead4df18cf835f70849df0b4ab37db4fd407f9d535b1c6419a6b4bc99327052ccfb4d5a033db2af15bc4c71128e08d5a97e1de9efd1e2f7f1952602fea41a862818be4bff27f4516cade2194a9a2de6df706986480eb9a415754dee42d53be725b81b67519277ddd016b5d7ad3033878c65935f157fd238b421fb6c936e502d6d3cea580b1245d7423cddefbbc63043a3c5b7f8359eba27ae8b20607937d9bf09e97cb0e6fe8f9d14b3c899099184f12bdbdfc0a3b3d79c3575bc42f433228dade687d8217f4820e45f53e8aab56756f86ea751d530647b817450dc87c89c8f22e4be5badf78318698ffeec6d59018fbdc4010d0f12cb17b795ed1fc6af0d31522644e3144f82d5ac5660fd40b3af045eaff5327329dac2ac9e14e8972e49d878132f51261b9dfe74103519e21a55607d0266e4928f450e7f2892f47124770e8fb59ea0bbb76ed9636267d335e5bf275280f06fe85e80edf4ed4674f52db10110a6392437752ae2a881e296d4fba77b321a50a139e6bbf540acc4504137d3bb1a618a71f5c71df1edf6e5e5f81b9059154f8feb9d3e1a987b7f763d99191fe504182dd76fdd52499bb390e6716956ebda4b31cc519b51bb5fcf324aa66213f4d38c2f7a012fd57a648fa0b7ddc4395a0d477d87b5e75ddb1163bb9f5ec1172b169d937095926a44a67135902a231fe04e874eaacc496d923bd681344e09e50ef4f2478506e0c41a0b111ef6ae0397dcd61d772823c6648ed2c14ad056d69c7ef02738c8ff8caaa5f5cd67f4591f33a9f2f1fd3d7542fafa3c53390b8124ddd7ab5e8097a23ce5b9d146be8d85d5ab168eb394762dbf7a4439da340bc4c9b2edc4a0727d681e459927c3e8912872e2ae5180438c7f53e944996d4e8bd9554e74667f7453eefc95c1a19d2de6ee5a0d8d29384b6a53e8bf1f8713f9e48a0291b871c39b7f13819f87366d88b0d7c6ffef656dae75e6197167ced991d3cbbd508ca3f5b2836ed96931d215a6ef7ae9f9906a66eb34e9d35899ac5fec44263de1a686f7af889a0bcea007ef4377658f04bae0ce85c91f4fca08cfc6e1bed803e219d9cb4825a95be68245f47f9ac5d2fb10dad4b2fb38de7d099fc7540329d09145c36de598a76be748de26b9e585ce2d94ed97890df953f82c1a5699efcce5ae668ea15d9b35086b647a2b3fa65492b49b9bbc5b9fba7d44ad4fce56852c8316fd4cc396a8b5a085169a9ad784cf73de118db9d2f5a742e0f2273cbc7fcf724b5ac180e179a81d425d64ce7720962ec5cb76dd6406d3240b04fa3491af0b55588d32c7e8f721b2c22271fee73fca3929e439623373cda46f84648cd28dde88d800959e9", 0x1000, 0x4048000, 0x0, 0x0) 03:33:52 executing program 0: shmget$private(0x0, 0xfffffffffeffffff, 0x0, &(0x7f0000ffb000/0x3000)=nil) [ 659.244846] IPVS: ftp: loaded support on port[0] = 21 03:33:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000240)={&(0x7f0000000380)=@newlink={0x54, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 659.340541] IPVS: ftp: loaded support on port[0] = 21 03:33:53 executing program 1: mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) eventfd2(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_procfs(0x0, &(0x7f0000000140)='uid_map\x00') shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000280)=""/189) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180), &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000200), 0x8) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000240)) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000380)=ANY=[]) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x3}}}}}}, &(0x7f0000000040)) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") accept4$unix(0xffffffffffffffff, &(0x7f0000000200)=@abs, &(0x7f0000000280)=0x6e, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000480)=0xe8) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) getresgid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) 03:33:53 executing program 5: clock_gettime(0x4, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000280)) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000002c0)=""/196, 0xc4, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:53 executing program 2: r0 = socket(0x400000000010, 0x2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000280)) sendmsg$unix(r1, &(0x7f0000001640)={&(0x7f00000002c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000015c0)=[{&(0x7f0000001580)="f18a51a7c171e791", 0x8}], 0x1, &(0x7f0000001780)=ANY=[@ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2], 0x20, 0x40000}, 0x80) openat$cgroup_procs(r1, &(0x7f00000016c0)='cgroup.procs\x00', 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x4565f66e0fd75387, &(0x7f0000000200)=0x4, 0xfffffffffffffe87) unshare(0x40000000) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x0, 0x2000}, 0x4) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xabfe, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) clock_gettime(0x8000000000, &(0x7f0000000340)) socket$packet(0x11, 0x1, 0x300) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100}) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020203000000100f020ee1000c08000b0000000000", 0x24) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000100)={0x22, 0x27, 0x12, 0xb, 0x8, 0x3, 0x1, 0xae, 0xffffffffffffffff}) sendto$inet6(r3, &(0x7f0000000380)="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", 0x1000, 0x4048000, 0x0, 0x0) 03:33:53 executing program 3: r0 = socket(0x400000000010, 0x2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000280)) sendmsg$unix(r1, &(0x7f0000001640)={&(0x7f00000002c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000015c0)=[{&(0x7f0000001580)="f18a51a7c171e791", 0x8}], 0x1, &(0x7f0000001780)=ANY=[@ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2], 0x20, 0x40000}, 0x80) openat$cgroup_procs(r1, &(0x7f00000016c0)='cgroup.procs\x00', 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x4565f66e0fd75387, &(0x7f0000000200)=0x4, 0xfffffffffffffe87) unshare(0x40000000) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x0, 0x2000}, 0x4) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xabfe, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) clock_gettime(0x8000000000, &(0x7f0000000340)) socket$packet(0x11, 0x1, 0x300) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100}) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020203000000100f020ee1000c08000b0000000000", 0x24) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000100)={0x22, 0x27, 0x12, 0xb, 0x8, 0x3, 0x1, 0xae, 0xffffffffffffffff}) sendto$inet6(r3, &(0x7f0000000380)="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", 0x1000, 0x4048000, 0x0, 0x0) 03:33:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000240)={&(0x7f0000000380)=@newlink={0x54, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 660.022710] IPVS: ftp: loaded support on port[0] = 21 [ 660.083041] IPVS: ftp: loaded support on port[0] = 21 03:33:53 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) memfd_create(&(0x7f0000000040)=',\x00', 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000000c0)=""/39, &(0x7f0000000140)=0x27) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:53 executing program 3: r0 = socket(0x400000000010, 0x2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000280)) sendmsg$unix(r1, &(0x7f0000001640)={&(0x7f00000002c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000015c0)=[{&(0x7f0000001580)="f18a51a7c171e791", 0x8}], 0x1, &(0x7f0000001780)=ANY=[@ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2], 0x20, 0x40000}, 0x80) openat$cgroup_procs(r1, &(0x7f00000016c0)='cgroup.procs\x00', 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x4565f66e0fd75387, &(0x7f0000000200)=0x4, 0xfffffffffffffe87) unshare(0x40000000) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x0, 0x2000}, 0x4) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xabfe, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) clock_gettime(0x8000000000, &(0x7f0000000340)) socket$packet(0x11, 0x1, 0x300) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100}) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020203000000100f020ee1000c08000b0000000000", 0x24) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000100)={0x22, 0x27, 0x12, 0xb, 0x8, 0x3, 0x1, 0xae, 0xffffffffffffffff}) sendto$inet6(r3, &(0x7f0000000380)="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", 0x1000, 0x4048000, 0x0, 0x0) 03:33:54 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f00000002c0)=ANY=[]) openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x42042, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[], 0x97) fcntl$notify(r0, 0x402, 0x8) sendfile(r1, r1, &(0x7f00000000c0), 0x8080ffffff10) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) 03:33:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000240)={&(0x7f0000000380)=@newlink={0x54, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) [ 660.846972] IPVS: ftp: loaded support on port[0] = 21 03:33:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000240)={&(0x7f0000000380)=@newlink={0x54, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x54}}, 0x0) 03:33:54 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x8000000000000004}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x949, 0x1b) fcntl$setstatus(r0, 0x4, 0x80042001) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000023, 0x0) 03:33:54 executing program 1: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f00000001c0), &(0x7f0000000200), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000440)=@ipx, &(0x7f0000000340)=0x80) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@remote, @remote}, &(0x7f00000006c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c80)={{{@in=@dev, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008dc0)={{{@in6=@loopback, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000008ec0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008fc0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009140)={@local, @rand_addr}, &(0x7f0000009180)=0xc) getsockname(0xffffffffffffffff, &(0x7f00000091c0)=@can, &(0x7f0000009240)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000009280)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000092c0)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000093c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009400)={{{@in6=@remote, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000009500)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009540)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000009640)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009680)={@mcast1}, &(0x7f00000096c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009800)={{{@in6=@local, @in6=@remote}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@multicast1}}, &(0x7f0000009900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009940)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000009a40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000009b80)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009bc0)={@mcast1}, &(0x7f0000009c00)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000009e40)={0x0, @remote, @multicast2}, &(0x7f0000009e80)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000009ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009f00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@local}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f000000a040)=0x34) accept4$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000a180)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a200)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ac40)={&(0x7f00000000c0), 0xc, &(0x7f000000ac00)={&(0x7f000000a240)={0x14}, 0x14}}, 0x0) getresgid(0xfffffffffffffffe, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001040)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000001140)=0xe8) getresgid(&(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000001200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000027c0)={{{@in6=@loopback, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000028c0)=0xe8) getgroups(0x0, &(0x7f0000002900)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003c40)) getuid() 03:33:54 executing program 0: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) prctl$setname(0xf, &(0x7f0000000840)="287fec744f6e305b4f6d30277784616e3100000000000000") openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000380)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000500)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000000600)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) getrusage(0x0, &(0x7f0000000240)) request_key(&(0x7f00000003c0)='cifs.spnego\x00', &(0x7f0000000480), &(0x7f00000004c0)='posix_acl_access+vboxnet1\x00', 0xfffffffffffffffc) keyctl$assume_authority(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() syz_execute_func(&(0x7f0000000580)="42805da012f0400fb34cbfb40f01eece73fe19fa380f38211af3f081768cc8000000c4627923e667f00fbab204000000ca6b2179e54175450f2e1ac4010d64ac1e5d31a3b744dbe271ff0703") ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000400)=""/239) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:33:54 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f00000002c0)=ANY=[]) openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x42042, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[], 0x97) fcntl$notify(r0, 0x402, 0x8) sendfile(r1, r1, &(0x7f00000000c0), 0x8080ffffff10) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) 03:33:54 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x8000000000000004}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x949, 0x1b) fcntl$setstatus(r0, 0x4, 0x80042001) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000023, 0x0) 03:33:54 executing program 0: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) prctl$setname(0xf, &(0x7f0000000840)="287fec744f6e305b4f6d30277784616e3100000000000000") openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000380)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000500)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000000600)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) getrusage(0x0, &(0x7f0000000240)) request_key(&(0x7f00000003c0)='cifs.spnego\x00', &(0x7f0000000480), &(0x7f00000004c0)='posix_acl_access+vboxnet1\x00', 0xfffffffffffffffc) keyctl$assume_authority(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() syz_execute_func(&(0x7f0000000580)="42805da012f0400fb34cbfb40f01eece73fe19fa380f38211af3f081768cc8000000c4627923e667f00fbab204000000ca6b2179e54175450f2e1ac4010d64ac1e5d31a3b744dbe271ff0703") ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000400)=""/239) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:33:54 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x8000000000000004}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x949, 0x1b) fcntl$setstatus(r0, 0x4, 0x80042001) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000023, 0x0) 03:33:54 executing program 4: perf_event_open(&(0x7f0000001f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000000efff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f000000b000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0xc1004110, &(0x7f0000001f64)="967d34f201000005100000009c") 03:33:55 executing program 4: perf_event_open(&(0x7f0000001f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000000efff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f000000b000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0xc1004110, &(0x7f0000001f64)="967d34f201000005100000009c") 03:33:55 executing program 0: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) prctl$setname(0xf, &(0x7f0000000840)="287fec744f6e305b4f6d30277784616e3100000000000000") openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000380)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000500)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000000600)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) getrusage(0x0, &(0x7f0000000240)) request_key(&(0x7f00000003c0)='cifs.spnego\x00', &(0x7f0000000480), &(0x7f00000004c0)='posix_acl_access+vboxnet1\x00', 0xfffffffffffffffc) keyctl$assume_authority(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() syz_execute_func(&(0x7f0000000580)="42805da012f0400fb34cbfb40f01eece73fe19fa380f38211af3f081768cc8000000c4627923e667f00fbab204000000ca6b2179e54175450f2e1ac4010d64ac1e5d31a3b744dbe271ff0703") ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000400)=""/239) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:33:55 executing program 4: perf_event_open(&(0x7f0000001f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000000efff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f000000b000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0xc1004110, &(0x7f0000001f64)="967d34f201000005100000009c") 03:33:55 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x8000000000000004}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x949, 0x1b) fcntl$setstatus(r0, 0x4, 0x80042001) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000023, 0x0) 03:33:55 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x8000000000000004}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x949, 0x1b) fcntl$setstatus(r0, 0x4, 0x80042001) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000023, 0x0) 03:33:55 executing program 1: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f00000001c0), &(0x7f0000000200), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000440)=@ipx, &(0x7f0000000340)=0x80) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@remote, @remote}, &(0x7f00000006c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c80)={{{@in=@dev, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008dc0)={{{@in6=@loopback, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000008ec0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008fc0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009140)={@local, @rand_addr}, &(0x7f0000009180)=0xc) getsockname(0xffffffffffffffff, &(0x7f00000091c0)=@can, &(0x7f0000009240)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000009280)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000092c0)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000093c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009400)={{{@in6=@remote, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000009500)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009540)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000009640)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009680)={@mcast1}, &(0x7f00000096c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009800)={{{@in6=@local, @in6=@remote}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@multicast1}}, &(0x7f0000009900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009940)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000009a40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000009b80)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009bc0)={@mcast1}, &(0x7f0000009c00)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000009e40)={0x0, @remote, @multicast2}, &(0x7f0000009e80)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000009ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009f00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@local}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f000000a040)=0x34) accept4$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000a180)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a200)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ac40)={&(0x7f00000000c0), 0xc, &(0x7f000000ac00)={&(0x7f000000a240)={0x14}, 0x14}}, 0x0) getresgid(0xfffffffffffffffe, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001040)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000001140)=0xe8) getresgid(&(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000001200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000027c0)={{{@in6=@loopback, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000028c0)=0xe8) getgroups(0x0, &(0x7f0000002900)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003c40)) getuid() 03:33:55 executing program 4: perf_event_open(&(0x7f0000001f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000000efff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f000000b000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0xc1004110, &(0x7f0000001f64)="967d34f201000005100000009c") 03:33:55 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f00000002c0)=ANY=[]) openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x42042, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[], 0x97) fcntl$notify(r0, 0x402, 0x8) sendfile(r1, r1, &(0x7f00000000c0), 0x8080ffffff10) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) 03:33:55 executing program 0: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) prctl$setname(0xf, &(0x7f0000000840)="287fec744f6e305b4f6d30277784616e3100000000000000") openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000380)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000500)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000000600)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) getrusage(0x0, &(0x7f0000000240)) request_key(&(0x7f00000003c0)='cifs.spnego\x00', &(0x7f0000000480), &(0x7f00000004c0)='posix_acl_access+vboxnet1\x00', 0xfffffffffffffffc) keyctl$assume_authority(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() syz_execute_func(&(0x7f0000000580)="42805da012f0400fb34cbfb40f01eece73fe19fa380f38211af3f081768cc8000000c4627923e667f00fbab204000000ca6b2179e54175450f2e1ac4010d64ac1e5d31a3b744dbe271ff0703") ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000400)=""/239) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:33:55 executing program 4: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f00000001c0), &(0x7f0000000200), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000440)=@ipx, &(0x7f0000000340)=0x80) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@remote, @remote}, &(0x7f00000006c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c80)={{{@in=@dev, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008dc0)={{{@in6=@loopback, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000008ec0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008fc0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009140)={@local, @rand_addr}, &(0x7f0000009180)=0xc) getsockname(0xffffffffffffffff, &(0x7f00000091c0)=@can, &(0x7f0000009240)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000009280)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000092c0)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000093c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009400)={{{@in6=@remote, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000009500)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009540)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000009640)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009680)={@mcast1}, &(0x7f00000096c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009800)={{{@in6=@local, @in6=@remote}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@multicast1}}, &(0x7f0000009900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009940)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000009a40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000009b80)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009bc0)={@mcast1}, &(0x7f0000009c00)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000009e40)={0x0, @remote, @multicast2}, &(0x7f0000009e80)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000009ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009f00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@local}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f000000a040)=0x34) accept4$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000a180)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a200)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ac40)={&(0x7f00000000c0), 0xc, &(0x7f000000ac00)={&(0x7f000000a240)={0x14}, 0x14}}, 0x0) getresgid(0xfffffffffffffffe, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001040)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000001140)=0xe8) getresgid(&(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000001200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000027c0)={{{@in6=@loopback, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000028c0)=0xe8) getgroups(0x0, &(0x7f0000002900)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003c40)) getuid() 03:33:55 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x8000000000000004}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x949, 0x1b) fcntl$setstatus(r0, 0x4, 0x80042001) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000023, 0x0) 03:33:56 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x8000000000000004}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x949, 0x1b) fcntl$setstatus(r0, 0x4, 0x80042001) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000023, 0x0) 03:33:56 executing program 0: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4={[], [], @rand_addr}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x0, [0x0, 0xfffffffffffffffe]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) futex(&(0x7f0000000280), 0x6, 0x2, &(0x7f0000000300), &(0x7f0000000380), 0x1) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x95, 0x4) 03:33:56 executing program 0: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4={[], [], @rand_addr}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x0, [0x0, 0xfffffffffffffffe]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) futex(&(0x7f0000000280), 0x6, 0x2, &(0x7f0000000300), &(0x7f0000000380), 0x1) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x95, 0x4) 03:33:56 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f00000002c0)=ANY=[]) openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x42042, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[], 0x97) fcntl$notify(r0, 0x402, 0x8) sendfile(r1, r1, &(0x7f00000000c0), 0x8080ffffff10) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) 03:33:56 executing program 1: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f00000001c0), &(0x7f0000000200), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000440)=@ipx, &(0x7f0000000340)=0x80) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@remote, @remote}, &(0x7f00000006c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c80)={{{@in=@dev, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008dc0)={{{@in6=@loopback, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000008ec0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008fc0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009140)={@local, @rand_addr}, &(0x7f0000009180)=0xc) getsockname(0xffffffffffffffff, &(0x7f00000091c0)=@can, &(0x7f0000009240)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000009280)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000092c0)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000093c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009400)={{{@in6=@remote, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000009500)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009540)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000009640)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009680)={@mcast1}, &(0x7f00000096c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009800)={{{@in6=@local, @in6=@remote}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@multicast1}}, &(0x7f0000009900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009940)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000009a40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000009b80)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009bc0)={@mcast1}, &(0x7f0000009c00)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000009e40)={0x0, @remote, @multicast2}, &(0x7f0000009e80)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000009ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009f00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@local}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f000000a040)=0x34) accept4$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000a180)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a200)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ac40)={&(0x7f00000000c0), 0xc, &(0x7f000000ac00)={&(0x7f000000a240)={0x14}, 0x14}}, 0x0) getresgid(0xfffffffffffffffe, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001040)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000001140)=0xe8) getresgid(&(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000001200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000027c0)={{{@in6=@loopback, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000028c0)=0xe8) getgroups(0x0, &(0x7f0000002900)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003c40)) getuid() 03:33:56 executing program 0: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4={[], [], @rand_addr}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x0, [0x0, 0xfffffffffffffffe]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) futex(&(0x7f0000000280), 0x6, 0x2, &(0x7f0000000300), &(0x7f0000000380), 0x1) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x95, 0x4) 03:33:56 executing program 5: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4={[], [], @rand_addr}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x0, [0x0, 0xfffffffffffffffe]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) futex(&(0x7f0000000280), 0x6, 0x2, &(0x7f0000000300), &(0x7f0000000380), 0x1) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x95, 0x4) 03:33:56 executing program 3: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4={[], [], @rand_addr}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x0, [0x0, 0xfffffffffffffffe]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) futex(&(0x7f0000000280), 0x6, 0x2, &(0x7f0000000300), &(0x7f0000000380), 0x1) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x95, 0x4) 03:33:57 executing program 4: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f00000001c0), &(0x7f0000000200), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000440)=@ipx, &(0x7f0000000340)=0x80) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@remote, @remote}, &(0x7f00000006c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c80)={{{@in=@dev, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008dc0)={{{@in6=@loopback, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000008ec0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008fc0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009140)={@local, @rand_addr}, &(0x7f0000009180)=0xc) getsockname(0xffffffffffffffff, &(0x7f00000091c0)=@can, &(0x7f0000009240)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000009280)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000092c0)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000093c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009400)={{{@in6=@remote, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000009500)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009540)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000009640)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009680)={@mcast1}, &(0x7f00000096c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009800)={{{@in6=@local, @in6=@remote}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@multicast1}}, &(0x7f0000009900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009940)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000009a40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000009b80)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009bc0)={@mcast1}, &(0x7f0000009c00)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000009e40)={0x0, @remote, @multicast2}, &(0x7f0000009e80)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000009ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009f00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@local}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f000000a040)=0x34) accept4$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000a180)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a200)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ac40)={&(0x7f00000000c0), 0xc, &(0x7f000000ac00)={&(0x7f000000a240)={0x14}, 0x14}}, 0x0) getresgid(0xfffffffffffffffe, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001040)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000001140)=0xe8) getresgid(&(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000001200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000027c0)={{{@in6=@loopback, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000028c0)=0xe8) getgroups(0x0, &(0x7f0000002900)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003c40)) getuid() 03:33:57 executing program 5: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4={[], [], @rand_addr}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x0, [0x0, 0xfffffffffffffffe]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) futex(&(0x7f0000000280), 0x6, 0x2, &(0x7f0000000300), &(0x7f0000000380), 0x1) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x95, 0x4) 03:33:57 executing program 0: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4={[], [], @rand_addr}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x0, [0x0, 0xfffffffffffffffe]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) futex(&(0x7f0000000280), 0x6, 0x2, &(0x7f0000000300), &(0x7f0000000380), 0x1) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x95, 0x4) [ 664.675600] attempt to access beyond end of device [ 664.680845] loop5: rw=1, want=114, limit=112 03:33:58 executing program 1: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f00000001c0), &(0x7f0000000200), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000440)=@ipx, &(0x7f0000000340)=0x80) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@remote, @remote}, &(0x7f00000006c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c80)={{{@in=@dev, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008dc0)={{{@in6=@loopback, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000008ec0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008fc0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009140)={@local, @rand_addr}, &(0x7f0000009180)=0xc) getsockname(0xffffffffffffffff, &(0x7f00000091c0)=@can, &(0x7f0000009240)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000009280)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000092c0)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000093c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009400)={{{@in6=@remote, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000009500)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009540)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000009640)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009680)={@mcast1}, &(0x7f00000096c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009800)={{{@in6=@local, @in6=@remote}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@multicast1}}, &(0x7f0000009900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009940)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000009a40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000009b80)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009bc0)={@mcast1}, &(0x7f0000009c00)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000009e40)={0x0, @remote, @multicast2}, &(0x7f0000009e80)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000009ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009f00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@local}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f000000a040)=0x34) accept4$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000a180)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a200)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ac40)={&(0x7f00000000c0), 0xc, &(0x7f000000ac00)={&(0x7f000000a240)={0x14}, 0x14}}, 0x0) getresgid(0xfffffffffffffffe, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001040)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000001140)=0xe8) getresgid(&(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000001200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000027c0)={{{@in6=@loopback, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000028c0)=0xe8) getgroups(0x0, &(0x7f0000002900)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003c40)) getuid() [ 664.726467] Buffer I/O error on dev loop5, logical block 113, lost async page write 03:33:58 executing program 0: keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000180), 0x0, &(0x7f0000000380)}, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000001680), 0x4) bind$pptp(0xffffffffffffffff, &(0x7f0000001840)={0x18, 0x2, {0x0, @broadcast}}, 0x1e) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000001600), &(0x7f0000001640)=0x14e) openat$null(0xffffffffffffff9c, &(0x7f0000001880)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000001800), 0x4) [ 664.778325] attempt to access beyond end of device 03:33:58 executing program 3: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4={[], [], @rand_addr}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x0, [0x0, 0xfffffffffffffffe]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) futex(&(0x7f0000000280), 0x6, 0x2, &(0x7f0000000300), &(0x7f0000000380), 0x1) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x95, 0x4) [ 664.833526] loop5: rw=1, want=115, limit=112 [ 664.858346] Buffer I/O error on dev loop5, logical block 114, lost async page write [ 664.894030] attempt to access beyond end of device [ 664.895276] attempt to access beyond end of device [ 664.898993] loop3: rw=1, want=114, limit=112 [ 664.917493] loop5: rw=1, want=116, limit=112 [ 664.921218] Buffer I/O error on dev loop3, logical block 113, lost async page write [ 664.921918] Buffer I/O error on dev loop5, logical block 115, lost async page write [ 664.949374] attempt to access beyond end of device 03:33:58 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff7d440000bfa100000000000007010000f8ffffffb702000003000000bf130000000000008500000006000000b700000000009b999500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r2 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xe, 0x8f, &(0x7f0000000100)="46f1263ab0e2d21caa642b2a88a8", &(0x7f0000000280)=""/143, 0x600}, 0x28) [ 664.968520] loop3: rw=1, want=115, limit=112 [ 664.983980] Buffer I/O error on dev loop3, logical block 114, lost async page write [ 664.991823] attempt to access beyond end of device [ 665.003724] attempt to access beyond end of device [ 665.008718] loop5: rw=1, want=117, limit=112 [ 665.025658] loop3: rw=1, want=116, limit=112 [ 665.030082] Buffer I/O error on dev loop3, logical block 115, lost async page write [ 665.041609] Buffer I/O error on dev loop5, logical block 116, lost async page write [ 665.061691] attempt to access beyond end of device [ 665.072495] attempt to access beyond end of device [ 665.077438] loop3: rw=1, want=117, limit=112 [ 665.082741] loop5: rw=1, want=130, limit=112 [ 665.094424] Buffer I/O error on dev loop5, logical block 129, lost async page write [ 665.109322] Buffer I/O error on dev loop3, logical block 116, lost async page write [ 665.130896] attempt to access beyond end of device [ 665.140843] attempt to access beyond end of device [ 665.147277] protocol 88a8 is buggy, dev gre0 [ 665.152759] loop5: rw=1, want=131, limit=112 [ 665.157186] Buffer I/O error on dev loop5, logical block 130, lost async page write [ 665.159426] protocol 88a8 is buggy, dev gre0 [ 665.167366] loop3: rw=1, want=130, limit=112 [ 665.187885] attempt to access beyond end of device [ 665.188146] protocol 88a8 is buggy, dev gre0 [ 665.199734] attempt to access beyond end of device [ 665.203991] protocol 88a8 is buggy, dev gre0 [ 665.208207] loop3: rw=1, want=131, limit=112 [ 665.222283] attempt to access beyond end of device [ 665.224500] loop5: rw=1, want=132, limit=112 [ 665.231662] attempt to access beyond end of device [ 665.239765] loop3: rw=1, want=132, limit=112 [ 665.240579] protocol 88a8 is buggy, dev gre0 [ 665.252862] protocol 88a8 is buggy, dev gre0 [ 665.255428] attempt to access beyond end of device [ 665.262143] protocol 88a8 is buggy, dev gre0 [ 665.272154] loop5: rw=1, want=133, limit=112 [ 665.272772] loop3: rw=1, want=133, limit=112 [ 665.287161] protocol 88a8 is buggy, dev gre0 [ 665.299730] attempt to access beyond end of device [ 665.305201] protocol 88a8 is buggy, dev gre0 [ 665.313366] attempt to access beyond end of device [ 665.317747] protocol 88a8 is buggy, dev gre0 [ 665.318313] loop5: rw=1, want=4237, limit=112 [ 665.335499] loop3: rw=1, want=4237, limit=112 [ 665.351677] attempt to access beyond end of device [ 665.371830] attempt to access beyond end of device [ 665.391195] loop5: rw=1, want=8333, limit=112 [ 665.413311] loop3: rw=1, want=8333, limit=112 [ 665.430519] attempt to access beyond end of device [ 665.447479] loop5: rw=1, want=12429, limit=112 [ 665.452838] attempt to access beyond end of device [ 665.466709] loop3: rw=1, want=12429, limit=112 03:33:58 executing program 4: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f00000001c0), &(0x7f0000000200), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000440)=@ipx, &(0x7f0000000340)=0x80) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@remote, @remote}, &(0x7f00000006c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c80)={{{@in=@dev, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008dc0)={{{@in6=@loopback, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000008ec0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008fc0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009140)={@local, @rand_addr}, &(0x7f0000009180)=0xc) getsockname(0xffffffffffffffff, &(0x7f00000091c0)=@can, &(0x7f0000009240)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000009280)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000092c0)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000093c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009400)={{{@in6=@remote, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000009500)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009540)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000009640)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009680)={@mcast1}, &(0x7f00000096c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009800)={{{@in6=@local, @in6=@remote}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@multicast1}}, &(0x7f0000009900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009940)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000009a40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000009b80)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009bc0)={@mcast1}, &(0x7f0000009c00)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000009e40)={0x0, @remote, @multicast2}, &(0x7f0000009e80)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000009ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009f00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f40)={{{@in6=@mcast2, @in=@local}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f000000a040)=0x34) accept4$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000a180)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a200)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ac40)={&(0x7f00000000c0), 0xc, &(0x7f000000ac00)={&(0x7f000000a240)={0x14}, 0x14}}, 0x0) getresgid(0xfffffffffffffffe, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001040)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000001140)=0xe8) getresgid(&(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000001200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000027c0)={{{@in6=@loopback, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000028c0)=0xe8) getgroups(0x0, &(0x7f0000002900)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003c40)) getuid() [ 665.494534] attempt to access beyond end of device [ 665.529021] attempt to access beyond end of device [ 665.540211] loop5: rw=1, want=16525, limit=112 [ 665.565627] loop3: rw=1, want=16525, limit=112 [ 665.585228] attempt to access beyond end of device [ 665.590178] loop5: rw=1, want=20621, limit=112 [ 665.620778] attempt to access beyond end of device [ 665.638903] loop3: rw=1, want=20621, limit=112 03:33:59 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{}, 0x0, 0x0, 0x0, 0x0, "727d4568a302f6a4"}, 0x10}}, 0x0) [ 665.673893] attempt to access beyond end of device [ 665.675286] attempt to access beyond end of device [ 665.694601] loop5: rw=1, want=24717, limit=112 03:33:59 executing program 0: keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000180), 0x0, &(0x7f0000000380)}, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000001680), 0x4) bind$pptp(0xffffffffffffffff, &(0x7f0000001840)={0x18, 0x2, {0x0, @broadcast}}, 0x1e) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000001600), &(0x7f0000001640)=0x14e) openat$null(0xffffffffffffff9c, &(0x7f0000001880)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000001800), 0x4) [ 665.737714] attempt to access beyond end of device [ 665.741462] loop3: rw=1, want=24717, limit=112 [ 665.772175] loop5: rw=1, want=28813, limit=112 [ 665.779767] attempt to access beyond end of device [ 665.795598] loop3: rw=1, want=28813, limit=112 [ 665.823559] attempt to access beyond end of device [ 665.841374] attempt to access beyond end of device [ 665.846707] loop5: rw=1, want=32885, limit=112 [ 665.856804] loop3: rw=1, want=32885, limit=112 03:33:59 executing program 4: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x200000, 0x0) request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180), &(0x7f00000001c0)='\x00', 0xfffffffffffffff9) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000280)) socket$inet6_dccp(0xa, 0x6, 0x0) dup(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000500)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@loopback, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @loopback}, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f00000007c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000900)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in=@loopback, @in6=@mcast1}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000a40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in, @in6=@loopback}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getgid() getgid() lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0xc) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e00), &(0x7f0000000e40)=0xc) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000001000)) getresgid(&(0x7f0000000e80), &(0x7f0000000ec0), &(0x7f0000000f00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:33:59 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff7d440000bfa100000000000007010000f8ffffffb702000003000000bf130000000000008500000006000000b700000000009b999500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r2 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xe, 0x8f, &(0x7f0000000100)="46f1263ab0e2d21caa642b2a88a8", &(0x7f0000000280)=""/143, 0x600}, 0x28) 03:33:59 executing program 0: keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000180), 0x0, &(0x7f0000000380)}, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000001680), 0x4) bind$pptp(0xffffffffffffffff, &(0x7f0000001840)={0x18, 0x2, {0x0, @broadcast}}, 0x1e) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000001600), &(0x7f0000001640)=0x14e) openat$null(0xffffffffffffff9c, &(0x7f0000001880)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000001800), 0x4) 03:34:01 executing program 5: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4={[], [], @rand_addr}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x0, [0x0, 0xfffffffffffffffe]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) futex(&(0x7f0000000280), 0x6, 0x2, &(0x7f0000000300), &(0x7f0000000380), 0x1) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x95, 0x4) 03:34:01 executing program 4: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x200000, 0x0) request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180), &(0x7f00000001c0)='\x00', 0xfffffffffffffff9) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000280)) socket$inet6_dccp(0xa, 0x6, 0x0) dup(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000500)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@loopback, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @loopback}, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f00000007c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000900)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in=@loopback, @in6=@mcast1}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000a40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in, @in6=@loopback}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getgid() getgid() lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0xc) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e00), &(0x7f0000000e40)=0xc) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000001000)) getresgid(&(0x7f0000000e80), &(0x7f0000000ec0), &(0x7f0000000f00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:01 executing program 0: keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000180), 0x0, &(0x7f0000000380)}, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000001680), 0x4) bind$pptp(0xffffffffffffffff, &(0x7f0000001840)={0x18, 0x2, {0x0, @broadcast}}, 0x1e) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000001600), &(0x7f0000001640)=0x14e) openat$null(0xffffffffffffff9c, &(0x7f0000001880)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000001800), 0x4) 03:34:01 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff7d440000bfa100000000000007010000f8ffffffb702000003000000bf130000000000008500000006000000b700000000009b999500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r2 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xe, 0x8f, &(0x7f0000000100)="46f1263ab0e2d21caa642b2a88a8", &(0x7f0000000280)=""/143, 0x600}, 0x28) 03:34:01 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff7d440000bfa100000000000007010000f8ffffffb702000003000000bf130000000000008500000006000000b700000000009b999500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r2 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xe, 0x8f, &(0x7f0000000100)="46f1263ab0e2d21caa642b2a88a8", &(0x7f0000000280)=""/143, 0x600}, 0x28) 03:34:01 executing program 3: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "645cde", 0x10, 0x11, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x8848]}, @ipv4={[], [], @rand_addr}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffcba1", 0x0, "713af2"}}}}}}}, &(0x7f0000000040)={0x0, 0x0, [0x0, 0xfffffffffffffffe]}) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) futex(&(0x7f0000000280), 0x6, 0x2, &(0x7f0000000300), &(0x7f0000000380), 0x1) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x95, 0x4) [ 667.853723] attempt to access beyond end of device [ 667.858723] loop3: rw=1, want=114, limit=112 [ 667.874637] attempt to access beyond end of device [ 667.908335] loop3: rw=1, want=115, limit=112 [ 667.925646] attempt to access beyond end of device [ 667.930637] loop3: rw=1, want=116, limit=112 [ 667.960559] attempt to access beyond end of device [ 667.975773] loop3: rw=1, want=117, limit=112 [ 667.980221] attempt to access beyond end of device [ 668.005830] loop3: rw=1, want=130, limit=112 [ 668.010316] attempt to access beyond end of device [ 668.054303] loop3: rw=1, want=131, limit=112 [ 668.058815] attempt to access beyond end of device [ 668.102123] loop3: rw=1, want=132, limit=112 [ 668.106625] attempt to access beyond end of device [ 668.111562] loop3: rw=1, want=133, limit=112 [ 668.231132] attempt to access beyond end of device [ 668.259829] loop3: rw=1, want=4237, limit=112 [ 668.339655] attempt to access beyond end of device [ 668.397364] loop3: rw=1, want=8149, limit=112 [ 668.436663] attempt to access beyond end of device [ 668.470257] loop3: rw=1, want=8150, limit=112 [ 668.496766] attempt to access beyond end of device [ 668.529072] loop3: rw=1, want=8151, limit=112 [ 668.554484] attempt to access beyond end of device [ 668.586967] loop3: rw=1, want=8152, limit=112 [ 668.612306] attempt to access beyond end of device [ 668.642997] loop3: rw=1, want=8153, limit=112 [ 668.668104] attempt to access beyond end of device [ 668.700317] loop3: rw=1, want=8182, limit=112 [ 668.728815] attempt to access beyond end of device [ 668.769725] loop3: rw=1, want=8183, limit=112 [ 668.829833] attempt to access beyond end of device 03:34:02 executing program 4: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x200000, 0x0) request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180), &(0x7f00000001c0)='\x00', 0xfffffffffffffff9) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000280)) socket$inet6_dccp(0xa, 0x6, 0x0) dup(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000500)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@loopback, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @loopback}, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f00000007c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000900)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in=@loopback, @in6=@mcast1}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000a40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in, @in6=@loopback}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getgid() getgid() lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0xc) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e00), &(0x7f0000000e40)=0xc) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000001000)) getresgid(&(0x7f0000000e80), &(0x7f0000000ec0), &(0x7f0000000f00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:02 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff7d440000bfa100000000000007010000f8ffffffb702000003000000bf130000000000008500000006000000b700000000009b999500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r2 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xe, 0x8f, &(0x7f0000000100)="46f1263ab0e2d21caa642b2a88a8", &(0x7f0000000280)=""/143, 0x600}, 0x28) [ 668.888781] loop3: rw=1, want=8184, limit=112 03:34:02 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff7d440000bfa100000000000007010000f8ffffffb702000003000000bf130000000000008500000006000000b700000000009b999500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r2 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xe, 0x8f, &(0x7f0000000100)="46f1263ab0e2d21caa642b2a88a8", &(0x7f0000000280)=""/143, 0x600}, 0x28) [ 668.935352] attempt to access beyond end of device [ 668.964645] loop3: rw=1, want=8185, limit=112 03:34:02 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff7d440000bfa100000000000007010000f8ffffffb702000003000000bf130000000000008500000006000000b700000000009b999500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r2 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xe, 0x8f, &(0x7f0000000100)="46f1263ab0e2d21caa642b2a88a8", &(0x7f0000000280)=""/143, 0x600}, 0x28) 03:34:02 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff7d440000bfa100000000000007010000f8ffffffb702000003000000bf130000000000008500000006000000b700000000009b999500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r2 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xe, 0x8f, &(0x7f0000000100)="46f1263ab0e2d21caa642b2a88a8", &(0x7f0000000280)=""/143, 0x600}, 0x28) [ 669.000830] attempt to access beyond end of device [ 669.008218] attempt to access beyond end of device [ 669.015662] loop5: rw=1, want=130, limit=112 [ 669.042294] attempt to access beyond end of device [ 669.048891] loop3: rw=1, want=8206, limit=112 [ 669.082937] loop5: rw=1, want=131, limit=112 [ 669.092286] attempt to access beyond end of device [ 669.105167] attempt to access beyond end of device [ 669.111361] loop3: rw=1, want=8207, limit=112 [ 669.127983] attempt to access beyond end of device [ 669.132224] loop5: rw=1, want=132, limit=112 [ 669.143271] loop3: rw=1, want=8208, limit=112 [ 669.147509] attempt to access beyond end of device [ 669.150221] attempt to access beyond end of device [ 669.162253] loop3: rw=1, want=8209, limit=112 [ 669.166796] attempt to access beyond end of device [ 669.171729] loop3: rw=1, want=8242, limit=112 [ 669.183030] loop5: rw=1, want=133, limit=112 [ 669.184797] attempt to access beyond end of device [ 669.187481] attempt to access beyond end of device [ 669.187498] loop5: rw=1, want=142, limit=112 [ 669.217927] loop3: rw=1, want=8243, limit=112 [ 669.228518] attempt to access beyond end of device [ 669.240008] attempt to access beyond end of device [ 669.243178] loop5: rw=1, want=143, limit=112 [ 669.256215] attempt to access beyond end of device [ 669.261183] loop5: rw=1, want=144, limit=112 [ 669.261233] attempt to access beyond end of device [ 669.261243] loop5: rw=1, want=145, limit=112 [ 669.276528] loop3: rw=1, want=8244, limit=112 [ 669.288601] attempt to access beyond end of device [ 669.294042] attempt to access beyond end of device [ 669.303182] loop5: rw=1, want=4241, limit=112 [ 669.310863] loop3: rw=1, want=8245, limit=112 [ 669.325352] attempt to access beyond end of device [ 669.337828] attempt to access beyond end of device [ 669.341462] loop3: rw=1, want=8258, limit=112 [ 669.352416] attempt to access beyond end of device [ 669.358114] loop5: rw=1, want=6873, limit=112 [ 669.368596] loop3: rw=1, want=8259, limit=112 [ 669.383519] attempt to access beyond end of device [ 669.387922] attempt to access beyond end of device [ 669.405739] loop5: rw=1, want=6902, limit=112 [ 669.410370] loop3: rw=1, want=8260, limit=112 [ 669.428011] attempt to access beyond end of device [ 669.434355] attempt to access beyond end of device [ 669.452729] loop5: rw=1, want=6903, limit=112 [ 669.458530] loop3: rw=1, want=8261, limit=112 [ 669.473138] attempt to access beyond end of device [ 669.480676] attempt to access beyond end of device [ 669.499298] loop5: rw=1, want=6904, limit=112 [ 669.507429] loop3: rw=1, want=8270, limit=112 [ 669.521824] attempt to access beyond end of device [ 669.529295] attempt to access beyond end of device [ 669.541336] loop5: rw=1, want=6905, limit=112 [ 669.548433] loop3: rw=1, want=8271, limit=112 [ 669.557350] attempt to access beyond end of device [ 669.566093] attempt to access beyond end of device [ 669.575736] loop5: rw=1, want=6926, limit=112 [ 669.585030] loop3: rw=1, want=8272, limit=112 [ 669.591815] attempt to access beyond end of device [ 669.605582] attempt to access beyond end of device [ 669.615608] loop5: rw=1, want=6927, limit=112 [ 669.628321] loop3: rw=1, want=8273, limit=112 [ 669.637366] attempt to access beyond end of device [ 669.657506] loop5: rw=1, want=6928, limit=112 [ 669.679928] attempt to access beyond end of device [ 669.690397] attempt to access beyond end of device [ 669.708084] loop5: rw=1, want=6929, limit=112 [ 669.715088] loop3: rw=1, want=12369, limit=112 [ 669.729487] attempt to access beyond end of device 03:34:03 executing program 4: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x200000, 0x0) request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180), &(0x7f00000001c0)='\x00', 0xfffffffffffffff9) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000280)) socket$inet6_dccp(0xa, 0x6, 0x0) dup(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000500)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@loopback, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @loopback}, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f00000007c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000900)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in=@loopback, @in6=@mcast1}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000a40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in, @in6=@loopback}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getgid() getgid() lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0xc) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e00), &(0x7f0000000e40)=0xc) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000001000)) getresgid(&(0x7f0000000e80), &(0x7f0000000ec0), &(0x7f0000000f00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") [ 669.751034] loop5: rw=1, want=6978, limit=112 [ 669.766205] attempt to access beyond end of device [ 669.773909] buffer_io_error: 54 callbacks suppressed [ 669.773920] Buffer I/O error on dev loop5, logical block 6977, lost async page write [ 669.794363] loop3: rw=1, want=16465, limit=112 [ 669.831061] attempt to access beyond end of device 03:34:03 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) sysinfo(&(0x7f00000003c0)=""/182) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000700)=0x10) socket$inet6_udplite(0xa, 0x2, 0x88) dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000002d00)={0x8, "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", 0x1000}, 0xfffffffffffffd15) write$nbd(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getresgid(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f0000000480)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c40), 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:03 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff7d440000bfa100000000000007010000f8ffffffb702000003000000bf130000000000008500000006000000b700000000009b999500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r2 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xe, 0x8f, &(0x7f0000000100)="46f1263ab0e2d21caa642b2a88a8", &(0x7f0000000280)=""/143, 0x600}, 0x28) [ 669.887444] loop5: rw=1, want=6979, limit=112 [ 669.900105] attempt to access beyond end of device [ 669.905730] Buffer I/O error on dev loop5, logical block 6978, lost async page write [ 669.928513] loop3: rw=1, want=20561, limit=112 [ 669.933844] attempt to access beyond end of device [ 669.938789] loop5: rw=1, want=6980, limit=112 [ 669.964882] attempt to access beyond end of device [ 669.969828] loop3: rw=1, want=24657, limit=112 [ 669.975615] Buffer I/O error on dev loop5, logical block 6979, lost async page write [ 669.989902] attempt to access beyond end of device [ 670.002183] loop5: rw=1, want=6981, limit=112 [ 670.018440] Buffer I/O error on dev loop5, logical block 6980, lost async page write 03:34:03 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff7d440000bfa100000000000007010000f8ffffffb702000003000000bf130000000000008500000006000000b700000000009b999500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r2 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xe, 0x8f, &(0x7f0000000100)="46f1263ab0e2d21caa642b2a88a8", &(0x7f0000000280)=""/143, 0x600}, 0x28) [ 670.035814] attempt to access beyond end of device [ 670.047871] attempt to access beyond end of device [ 670.053422] loop3: rw=1, want=28753, limit=112 [ 670.069695] loop5: rw=1, want=6990, limit=112 [ 670.086168] attempt to access beyond end of device [ 670.094064] Buffer I/O error on dev loop5, logical block 6989, lost async page write [ 670.094097] attempt to access beyond end of device [ 670.094109] loop5: rw=1, want=6991, limit=112 [ 670.094120] Buffer I/O error on dev loop5, logical block 6990, lost async page write [ 670.094144] attempt to access beyond end of device [ 670.094153] loop5: rw=1, want=6992, limit=112 [ 670.094163] Buffer I/O error on dev loop5, logical block 6991, lost async page write [ 670.094186] attempt to access beyond end of device [ 670.094195] loop5: rw=1, want=6993, limit=112 [ 670.094205] Buffer I/O error on dev loop5, logical block 6992, lost async page write [ 670.129356] loop3: rw=1, want=29713, limit=112 [ 670.159533] net_ratelimit: 10770 callbacks suppressed [ 670.159541] protocol 88a8 is buggy, dev gre0 [ 670.177932] protocol 88a8 is buggy, dev gre0 [ 670.182712] protocol 88a8 is buggy, dev gre0 [ 670.197480] attempt to access beyond end of device [ 670.204466] protocol 88a8 is buggy, dev gre0 [ 670.209145] loop5: rw=1, want=11089, limit=112 [ 670.220094] protocol 88a8 is buggy, dev gre0 [ 670.230695] protocol 88a8 is buggy, dev gre0 [ 670.237798] attempt to access beyond end of device [ 670.243533] protocol 88a8 is buggy, dev gre0 [ 670.248332] protocol 88a8 is buggy, dev gre0 [ 670.255855] loop5: rw=1, want=15185, limit=112 [ 670.260720] protocol 88a8 is buggy, dev gre0 [ 670.268985] protocol 88a8 is buggy, dev gre0 [ 670.300214] attempt to access beyond end of device [ 670.324633] loop5: rw=1, want=19281, limit=112 [ 670.381278] attempt to access beyond end of device [ 670.405217] loop5: rw=1, want=23377, limit=112 [ 670.449070] attempt to access beyond end of device [ 670.465045] loop5: rw=1, want=27473, limit=112 [ 670.493967] attempt to access beyond end of device [ 670.511495] loop5: rw=1, want=27985, limit=112 03:34:04 executing program 4: r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@broadcast, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @rand_addr=0x80000000, {[@timestamp={0x44, 0x4}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f00000002c0)) 03:34:04 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) sysinfo(&(0x7f00000003c0)=""/182) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000700)=0x10) socket$inet6_udplite(0xa, 0x2, 0x88) dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000002d00)={0x8, "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", 0x1000}, 0xfffffffffffffd15) write$nbd(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getresgid(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f0000000480)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c40), 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:05 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff7d440000bfa100000000000007010000f8ffffffb702000003000000bf130000000000008500000006000000b700000000009b999500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r2 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xe, 0x8f, &(0x7f0000000100)="46f1263ab0e2d21caa642b2a88a8", &(0x7f0000000280)=""/143, 0x600}, 0x28) 03:34:05 executing program 4: r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@broadcast, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @rand_addr=0x80000000, {[@timestamp={0x44, 0x4}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f00000002c0)) 03:34:05 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0xc, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) 03:34:05 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) sysinfo(&(0x7f00000003c0)=""/182) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000700)=0x10) socket$inet6_udplite(0xa, 0x2, 0x88) dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000002d00)={0x8, "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", 0x1000}, 0xfffffffffffffd15) write$nbd(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getresgid(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f0000000480)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c40), 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:05 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff7d440000bfa100000000000007010000f8ffffffb702000003000000bf130000000000008500000006000000b700000000009b999500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r2 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xe, 0x8f, &(0x7f0000000100)="46f1263ab0e2d21caa642b2a88a8", &(0x7f0000000280)=""/143, 0x600}, 0x28) [ 672.073733] attempt to access beyond end of device [ 672.078718] loop3: rw=1, want=114, limit=112 [ 672.111905] Buffer I/O error on dev loop3, logical block 113, lost async page write [ 672.149874] attempt to access beyond end of device 03:34:05 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0xc, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) 03:34:05 executing program 3: setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000300), 0x8) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000500), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000005c0), &(0x7f0000000600)=0x8) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000280), 0x10) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000640), 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0)=ANY=[], &(0x7f0000000540)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000680)={'veth0\x00', {0x2, 0x0, @multicast1}}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0), &(0x7f0000002400)=0xc) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000400), &(0x7f0000004b40)=0x4) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)={@local}, &(0x7f00000001c0)=0x14) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000003c0)) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000002440)=ANY=[], &(0x7f00000024c0)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000380)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000002940)={0x0, @in={{0x2, 0x0, @dev}}}, &(0x7f0000002a40)=0x100) bind$llc(0xffffffffffffffff, &(0x7f0000000480), 0x10) [ 672.175094] loop3: rw=1, want=115, limit=112 03:34:05 executing program 4: r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@broadcast, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @rand_addr=0x80000000, {[@timestamp={0x44, 0x4}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f00000002c0)) [ 672.198306] Buffer I/O error on dev loop3, logical block 114, lost async page write [ 672.248703] attempt to access beyond end of device [ 672.264652] loop3: rw=1, want=116, limit=112 03:34:05 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0xc, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) [ 672.294043] attempt to access beyond end of device [ 672.312347] loop3: rw=1, want=117, limit=112 [ 672.325276] attempt to access beyond end of device [ 672.346691] loop3: rw=1, want=130, limit=112 03:34:05 executing program 4: r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@broadcast, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @rand_addr=0x80000000, {[@timestamp={0x44, 0x4}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f00000002c0)) [ 672.367558] attempt to access beyond end of device [ 672.380419] loop3: rw=1, want=131, limit=112 [ 672.400026] attempt to access beyond end of device [ 672.429114] loop3: rw=1, want=132, limit=112 [ 672.442252] attempt to access beyond end of device [ 672.474788] loop3: rw=1, want=133, limit=112 [ 672.506895] attempt to access beyond end of device 03:34:05 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0xc, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) [ 672.534032] loop3: rw=1, want=4237, limit=112 03:34:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") msgctl$MSG_INFO(0x0, 0xd, &(0x7f0000000140)=""/60) [ 672.596563] attempt to access beyond end of device [ 672.639354] loop3: rw=1, want=6165, limit=112 [ 672.659495] attempt to access beyond end of device [ 672.680916] loop3: rw=1, want=6166, limit=112 [ 672.707034] attempt to access beyond end of device [ 672.735822] loop3: rw=1, want=6167, limit=112 [ 672.750230] attempt to access beyond end of device [ 672.764417] loop3: rw=1, want=6168, limit=112 [ 672.775473] attempt to access beyond end of device [ 672.788165] loop3: rw=1, want=6169, limit=112 [ 672.815553] attempt to access beyond end of device [ 672.833014] loop3: rw=1, want=6198, limit=112 [ 672.850418] attempt to access beyond end of device [ 672.883798] loop3: rw=1, want=6199, limit=112 [ 672.888401] attempt to access beyond end of device [ 672.910937] loop3: rw=1, want=6200, limit=112 [ 672.918622] attempt to access beyond end of device [ 672.932643] loop3: rw=1, want=6201, limit=112 [ 672.940904] attempt to access beyond end of device [ 672.946432] loop3: rw=1, want=6222, limit=112 [ 672.951085] attempt to access beyond end of device [ 672.956632] loop3: rw=1, want=6223, limit=112 [ 672.967636] attempt to access beyond end of device [ 672.976083] loop3: rw=1, want=6224, limit=112 03:34:06 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff7d440000bfa100000000000007010000f8ffffffb702000003000000bf130000000000008500000006000000b700000000009b999500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r2 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0xe, 0x8f, &(0x7f0000000100)="46f1263ab0e2d21caa642b2a88a8", &(0x7f0000000280)=""/143, 0x600}, 0x28) 03:34:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") msgctl$MSG_INFO(0x0, 0xd, &(0x7f0000000140)=""/60) 03:34:06 executing program 1: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) unshare(0x0) signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:34:06 executing program 2: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) sysinfo(&(0x7f00000003c0)=""/182) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000700)=0x10) socket$inet6_udplite(0xa, 0x2, 0x88) dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000002d00)={0x8, "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", 0x1000}, 0xfffffffffffffd15) write$nbd(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getresgid(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f0000000480)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c40), 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) listen(r0, 0x6) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x1e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local}], 0x1c) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), 0x102e2) [ 672.980646] attempt to access beyond end of device [ 673.002190] loop3: rw=1, want=6225, limit=112 [ 673.006727] attempt to access beyond end of device [ 673.011661] loop3: rw=1, want=6258, limit=112 03:34:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") msgctl$MSG_INFO(0x0, 0xd, &(0x7f0000000140)=""/60) [ 673.078797] attempt to access beyond end of device [ 673.098012] loop3: rw=1, want=6259, limit=112 [ 673.116593] attempt to access beyond end of device [ 673.139801] loop3: rw=1, want=6260, limit=112 [ 673.167358] attempt to access beyond end of device [ 673.189173] loop3: rw=1, want=6261, limit=112 [ 673.201870] attempt to access beyond end of device [ 673.223325] loop3: rw=1, want=6274, limit=112 [ 673.246640] attempt to access beyond end of device [ 673.251603] loop3: rw=1, want=6275, limit=112 [ 673.274823] attempt to access beyond end of device [ 673.290306] loop3: rw=1, want=6276, limit=112 [ 673.303897] attempt to access beyond end of device [ 673.318205] loop3: rw=1, want=6277, limit=112 [ 673.327590] attempt to access beyond end of device [ 673.338653] loop3: rw=1, want=6286, limit=112 [ 673.347998] attempt to access beyond end of device [ 673.358965] loop3: rw=1, want=6287, limit=112 [ 673.368442] attempt to access beyond end of device [ 673.379351] loop3: rw=1, want=6288, limit=112 [ 673.398008] attempt to access beyond end of device [ 673.410089] loop3: rw=1, want=6289, limit=112 [ 673.441309] attempt to access beyond end of device [ 673.456789] loop3: rw=1, want=10385, limit=112 [ 673.484604] attempt to access beyond end of device [ 673.495416] loop3: rw=1, want=14481, limit=112 [ 673.525043] attempt to access beyond end of device [ 673.535877] loop3: rw=1, want=18577, limit=112 [ 673.566286] attempt to access beyond end of device [ 673.578158] loop3: rw=1, want=22673, limit=112 [ 673.606383] attempt to access beyond end of device [ 673.611328] loop3: rw=1, want=26769, limit=112 [ 673.641022] attempt to access beyond end of device [ 673.651855] loop3: rw=1, want=27841, limit=112 03:34:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) listen(r0, 0x6) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x1e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local}], 0x1c) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), 0x102e2) 03:34:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") msgctl$MSG_INFO(0x0, 0xd, &(0x7f0000000140)=""/60) 03:34:08 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) listen(r0, 0x6) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x1e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local}], 0x1c) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), 0x102e2) 03:34:08 executing program 3: setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000300), 0x8) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000500), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000005c0), &(0x7f0000000600)=0x8) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000280), 0x10) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000640), 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0)=ANY=[], &(0x7f0000000540)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000680)={'veth0\x00', {0x2, 0x0, @multicast1}}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0), &(0x7f0000002400)=0xc) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000400), &(0x7f0000004b40)=0x4) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)={@local}, &(0x7f00000001c0)=0x14) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000003c0)) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000002440)=ANY=[], &(0x7f00000024c0)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000380)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000002940)={0x0, @in={{0x2, 0x0, @dev}}}, &(0x7f0000002a40)=0x100) bind$llc(0xffffffffffffffff, &(0x7f0000000480), 0x10) 03:34:08 executing program 2: keyctl$setperm(0x16, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) getresuid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) fstat(0xffffffffffffffff, &(0x7f0000000900)) getgroups(0x0, &(0x7f0000000980)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000ac0)=0xe8) getresgid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) fstat(0xffffffffffffffff, &(0x7f0000000e80)) geteuid() lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000fc0)={{{@in=@remote, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000010c0)=0xe8) getresgid(&(0x7f0000001100), &(0x7f0000001140), &(0x7f0000001180)) getresuid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) lstat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) stat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000020c0), &(0x7f0000002100)=0xc) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003180)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000002240)=0xe8) getgroups(0x0, &(0x7f0000002280)) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000022c0)={0x0, 0x0, 0x0, 0xffffffffffffff9c}) getresuid(&(0x7f0000002300), &(0x7f0000002340), &(0x7f0000002380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:08 executing program 1: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) unshare(0x0) signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:34:08 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff75257001bfa100000000000007010000f8ffffffb702000008000000bf130000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x85, &(0x7f0000000180)="af57d0c4d7717b79510b6963cd80", &(0x7f0000000340)=""/133}, 0x28) 03:34:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) listen(r0, 0x6) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x1e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local}], 0x1c) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), 0x102e2) 03:34:08 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) listen(r0, 0x6) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x1e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local}], 0x1c) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), 0x102e2) 03:34:08 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff75257001bfa100000000000007010000f8ffffffb702000008000000bf130000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x85, &(0x7f0000000180)="af57d0c4d7717b79510b6963cd80", &(0x7f0000000340)=""/133}, 0x28) 03:34:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) listen(r0, 0x6) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x1e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local}], 0x1c) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), 0x102e2) 03:34:08 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) listen(r0, 0x6) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x1e, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @local}], 0x1c) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040), 0x102e2) 03:34:08 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff75257001bfa100000000000007010000f8ffffffb702000008000000bf130000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x85, &(0x7f0000000180)="af57d0c4d7717b79510b6963cd80", &(0x7f0000000340)=""/133}, 0x28) 03:34:08 executing program 0: getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid_for_children\x00') clock_getres(0x0, &(0x7f00000001c0)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000200), 0xfffffffffffffcf0) pipe2$9p(&(0x7f0000000300), 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000340)) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000a00)) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpgid(0x0) syz_execute_func(&(0x7f00000004c0)="42805da0510fef69dc0f0fb9ffefffffbfcece9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f380182b520cdc482b193ac9e0e000000fee60f2e2121010d64ac1e5d31a3b7e2989d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:34:08 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff75257001bfa100000000000007010000f8ffffffb702000008000000bf130000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x85, &(0x7f0000000180)="af57d0c4d7717b79510b6963cd80", &(0x7f0000000340)=""/133}, 0x28) 03:34:09 executing program 3: setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000300), 0x8) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000500), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000005c0), &(0x7f0000000600)=0x8) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000280), 0x10) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000640), 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0)=ANY=[], &(0x7f0000000540)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000680)={'veth0\x00', {0x2, 0x0, @multicast1}}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0), &(0x7f0000002400)=0xc) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000400), &(0x7f0000004b40)=0x4) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)={@local}, &(0x7f00000001c0)=0x14) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000003c0)) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000002440)=ANY=[], &(0x7f00000024c0)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000380)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000002940)={0x0, @in={{0x2, 0x0, @dev}}}, &(0x7f0000002a40)=0x100) bind$llc(0xffffffffffffffff, &(0x7f0000000480), 0x10) 03:34:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1) 03:34:09 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680), 0x0) ioperm(0x0, 0x0, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f00000005c0)) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000580)) getpid() fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000400)={@loopback}, &(0x7f0000000440)=0x20) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000004c0), &(0x7f0000000500)=0x10) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$setendian(0x14, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='pids.events\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) times(&(0x7f0000000740)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team_slave_1\x00'}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpid() 03:34:09 executing program 0: getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid_for_children\x00') clock_getres(0x0, &(0x7f00000001c0)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000200), 0xfffffffffffffcf0) pipe2$9p(&(0x7f0000000300), 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000340)) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000a00)) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpgid(0x0) syz_execute_func(&(0x7f00000004c0)="42805da0510fef69dc0f0fb9ffefffffbfcece9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f380182b520cdc482b193ac9e0e000000fee60f2e2121010d64ac1e5d31a3b7e2989d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:34:09 executing program 1: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) unshare(0x0) signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:34:09 executing program 2: keyctl$setperm(0x16, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) getresuid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) fstat(0xffffffffffffffff, &(0x7f0000000900)) getgroups(0x0, &(0x7f0000000980)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000ac0)=0xe8) getresgid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) fstat(0xffffffffffffffff, &(0x7f0000000e80)) geteuid() lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000fc0)={{{@in=@remote, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000010c0)=0xe8) getresgid(&(0x7f0000001100), &(0x7f0000001140), &(0x7f0000001180)) getresuid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) lstat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) stat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000020c0), &(0x7f0000002100)=0xc) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003180)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000002240)=0xe8) getgroups(0x0, &(0x7f0000002280)) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000022c0)={0x0, 0x0, 0x0, 0xffffffffffffff9c}) getresuid(&(0x7f0000002300), &(0x7f0000002340), &(0x7f0000002380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1) 03:34:09 executing program 0: getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid_for_children\x00') clock_getres(0x0, &(0x7f00000001c0)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000200), 0xfffffffffffffcf0) pipe2$9p(&(0x7f0000000300), 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000340)) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000a00)) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpgid(0x0) syz_execute_func(&(0x7f00000004c0)="42805da0510fef69dc0f0fb9ffefffffbfcece9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f380182b520cdc482b193ac9e0e000000fee60f2e2121010d64ac1e5d31a3b7e2989d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:34:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1) 03:34:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1) 03:34:09 executing program 0: getpgid(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid_for_children\x00') clock_getres(0x0, &(0x7f00000001c0)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000200), 0xfffffffffffffcf0) pipe2$9p(&(0x7f0000000300), 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000340)) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000a00)) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpgid(0x0) syz_execute_func(&(0x7f00000004c0)="42805da0510fef69dc0f0fb9ffefffffbfcece9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f380182b520cdc482b193ac9e0e000000fee60f2e2121010d64ac1e5d31a3b7e2989d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:34:09 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300140006000000000000000000000000000000000008000500ac14141a080003000100000f010008"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000000c0)={0x1, r1}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f00000001c0)=0x8) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[{0x3, 0xc91}], 0x1) ioctl$KVM_RUN(r4, 0xae80, 0x0) 03:34:10 executing program 3: setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000300), 0x8) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000500), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000005c0), &(0x7f0000000600)=0x8) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000280), 0x10) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000640), 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000004c0)=ANY=[], &(0x7f0000000540)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000680)={'veth0\x00', {0x2, 0x0, @multicast1}}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0), &(0x7f0000002400)=0xc) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000400), &(0x7f0000004b40)=0x4) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)={@local}, &(0x7f00000001c0)=0x14) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000003c0)) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000002440)=ANY=[], &(0x7f00000024c0)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000380)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000002940)={0x0, @in={{0x2, 0x0, @dev}}}, &(0x7f0000002a40)=0x100) bind$llc(0xffffffffffffffff, &(0x7f0000000480), 0x10) 03:34:10 executing program 0: mremap(&(0x7f0000ffa000/0x4000)=nil, 0x6000, 0x10000, 0x0, &(0x7f0000fec000/0x10000)=nil) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='fd/3\x00') getpeername(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000380)=0x80) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ec0)={{{@in=@dev, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000fc0)=0xe8) getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:10 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680), 0x0) ioperm(0x0, 0x0, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f00000005c0)) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000580)) getpid() fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000400)={@loopback}, &(0x7f0000000440)=0x20) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000004c0), &(0x7f0000000500)=0x10) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$setendian(0x14, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='pids.events\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) times(&(0x7f0000000740)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team_slave_1\x00'}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpid() 03:34:10 executing program 1: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) unshare(0x0) signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:34:10 executing program 2: keyctl$setperm(0x16, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) getresuid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) fstat(0xffffffffffffffff, &(0x7f0000000900)) getgroups(0x0, &(0x7f0000000980)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000ac0)=0xe8) getresgid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) fstat(0xffffffffffffffff, &(0x7f0000000e80)) geteuid() lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000fc0)={{{@in=@remote, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000010c0)=0xe8) getresgid(&(0x7f0000001100), &(0x7f0000001140), &(0x7f0000001180)) getresuid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) lstat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) stat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000020c0), &(0x7f0000002100)=0xc) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003180)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000002240)=0xe8) getgroups(0x0, &(0x7f0000002280)) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000022c0)={0x0, 0x0, 0x0, 0xffffffffffffff9c}) getresuid(&(0x7f0000002300), &(0x7f0000002340), &(0x7f0000002380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:10 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300140006000000000000000000000000000000000008000500ac14141a080003000100000f010008"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000000c0)={0x1, r1}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f00000001c0)=0x8) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[{0x3, 0xc91}], 0x1) ioctl$KVM_RUN(r4, 0xae80, 0x0) 03:34:11 executing program 2: keyctl$setperm(0x16, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) getresuid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) fstat(0xffffffffffffffff, &(0x7f0000000900)) getgroups(0x0, &(0x7f0000000980)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000ac0)=0xe8) getresgid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) fstat(0xffffffffffffffff, &(0x7f0000000e80)) geteuid() lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000fc0)={{{@in=@remote, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000010c0)=0xe8) getresgid(&(0x7f0000001100), &(0x7f0000001140), &(0x7f0000001180)) getresuid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) lstat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) stat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000020c0), &(0x7f0000002100)=0xc) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003180)={{{@in=@multicast1, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000002240)=0xe8) getgroups(0x0, &(0x7f0000002280)) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000022c0)={0x0, 0x0, 0x0, 0xffffffffffffff9c}) getresuid(&(0x7f0000002300), &(0x7f0000002340), &(0x7f0000002380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:11 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffe) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) sysinfo(&(0x7f00000003c0)=""/182) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000700)=0x10) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:11 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000013000)={0x1, 0x9, 0xa, 0x1000000000000008}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000040)='1', &(0x7f00000000c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f000000a000)={r0, &(0x7f0000008000), &(0x7f0000016f02)=""/254}, 0x18) 03:34:11 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680), 0x0) ioperm(0x0, 0x0, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f00000005c0)) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000580)) getpid() fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000400)={@loopback}, &(0x7f0000000440)=0x20) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000004c0), &(0x7f0000000500)=0x10) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$setendian(0x14, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='pids.events\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) times(&(0x7f0000000740)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team_slave_1\x00'}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpid() 03:34:11 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000013000)={0x1, 0x9, 0xa, 0x1000000000000008}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000040)='1', &(0x7f00000000c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f000000a000)={r0, &(0x7f0000008000), &(0x7f0000016f02)=""/254}, 0x18) 03:34:11 executing program 0: mremap(&(0x7f0000ffa000/0x4000)=nil, 0x6000, 0x10000, 0x0, &(0x7f0000fec000/0x10000)=nil) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='fd/3\x00') getpeername(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000380)=0x80) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ec0)={{{@in=@dev, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000fc0)=0xe8) getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:11 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000013000)={0x1, 0x9, 0xa, 0x1000000000000008}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000040)='1', &(0x7f00000000c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f000000a000)={r0, &(0x7f0000008000), &(0x7f0000016f02)=""/254}, 0x18) 03:34:11 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000013000)={0x1, 0x9, 0xa, 0x1000000000000008}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000040)='1', &(0x7f00000000c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f000000a000)={r0, &(0x7f0000008000), &(0x7f0000016f02)=""/254}, 0x18) 03:34:11 executing program 3: nanosleep(&(0x7f0000000040), 0x0) eventfd(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) sched_rr_get_interval(0x0, &(0x7f00000000c0)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f00000005c0)='\x00', 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000600), 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000700)=""/81) clock_gettime(0x0, &(0x7f0000000580)) fstat(0xffffffffffffffff, &(0x7f0000000800)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000500)) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000540)={0x14}, 0x14) syz_execute_func(&(0x7f0000000240)="428055a061f36ee9d92a5c41ff0f1837370f38211ac4c4829bdd2520200fee0a9d9d2179fbe5f541754566470f71d600c48179fcdf26bc2ebc0d641e5dc4e1e0120db80000007f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000380)) connect$inet6(0xffffffffffffffff, &(0x7f0000000440)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)={@mcast2}, &(0x7f0000000400)=0x14) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000640)) accept$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @loopback}, &(0x7f0000000200)=0x10) getpgrp(0x0) 03:34:11 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300140006000000000000000000000000000000000008000500ac14141a080003000100000f010008"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000000c0)={0x1, r1}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f00000001c0)=0x8) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[{0x3, 0xc91}], 0x1) ioctl$KVM_RUN(r4, 0xae80, 0x0) 03:34:11 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffe) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) sysinfo(&(0x7f00000003c0)=""/182) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000700)=0x10) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='veth1_to_bond\x00', 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='bbr\x00', 0x4) r1 = socket$inet(0x10, 0x3, 0x10000000000004) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="4c0000001200ff09fffefd956fa283b724a6007900000000000094083540150024001d001fc41179b598bc593afd2068c62b2c192d73a8bfa654a6613b87e658c184510f4d28fcf76aabf35d", 0x4c}], 0x1}, 0x0) 03:34:12 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680), 0x0) ioperm(0x0, 0x0, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f00000005c0)) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000580)) getpid() fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000400)={@loopback}, &(0x7f0000000440)=0x20) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000004c0), &(0x7f0000000500)=0x10) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$setendian(0x14, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='pids.events\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) times(&(0x7f0000000740)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team_slave_1\x00'}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpid() 03:34:12 executing program 0: mremap(&(0x7f0000ffa000/0x4000)=nil, 0x6000, 0x10000, 0x0, &(0x7f0000fec000/0x10000)=nil) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='fd/3\x00') getpeername(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000380)=0x80) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ec0)={{{@in=@dev, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000fc0)=0xe8) getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='veth1_to_bond\x00', 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='bbr\x00', 0x4) r1 = socket$inet(0x10, 0x3, 0x10000000000004) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="4c0000001200ff09fffefd956fa283b724a6007900000000000094083540150024001d001fc41179b598bc593afd2068c62b2c192d73a8bfa654a6613b87e658c184510f4d28fcf76aabf35d", 0x4c}], 0x1}, 0x0) 03:34:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='veth1_to_bond\x00', 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='bbr\x00', 0x4) r1 = socket$inet(0x10, 0x3, 0x10000000000004) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="4c0000001200ff09fffefd956fa283b724a6007900000000000094083540150024001d001fc41179b598bc593afd2068c62b2c192d73a8bfa654a6613b87e658c184510f4d28fcf76aabf35d", 0x4c}], 0x1}, 0x0) 03:34:12 executing program 3: nanosleep(&(0x7f0000000040), 0x0) eventfd(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) sched_rr_get_interval(0x0, &(0x7f00000000c0)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f00000005c0)='\x00', 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000600), 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000700)=""/81) clock_gettime(0x0, &(0x7f0000000580)) fstat(0xffffffffffffffff, &(0x7f0000000800)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000500)) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000540)={0x14}, 0x14) syz_execute_func(&(0x7f0000000240)="428055a061f36ee9d92a5c41ff0f1837370f38211ac4c4829bdd2520200fee0a9d9d2179fbe5f541754566470f71d600c48179fcdf26bc2ebc0d641e5dc4e1e0120db80000007f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000380)) connect$inet6(0xffffffffffffffff, &(0x7f0000000440)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)={@mcast2}, &(0x7f0000000400)=0x14) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000640)) accept$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @loopback}, &(0x7f0000000200)=0x10) getpgrp(0x0) 03:34:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='veth1_to_bond\x00', 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='bbr\x00', 0x4) r1 = socket$inet(0x10, 0x3, 0x10000000000004) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="4c0000001200ff09fffefd956fa283b724a6007900000000000094083540150024001d001fc41179b598bc593afd2068c62b2c192d73a8bfa654a6613b87e658c184510f4d28fcf76aabf35d", 0x4c}], 0x1}, 0x0) 03:34:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='veth1_to_bond\x00', 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='bbr\x00', 0x4) r1 = socket$inet(0x10, 0x3, 0x10000000000004) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="4c0000001200ff09fffefd956fa283b724a6007900000000000094083540150024001d001fc41179b598bc593afd2068c62b2c192d73a8bfa654a6613b87e658c184510f4d28fcf76aabf35d", 0x4c}], 0x1}, 0x0) 03:34:12 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="145f420000000000000007ff000000000300140006000000000000000000000000000000000008000500ac14141a080003000100000f010008"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000000c0)={0x1, r1}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f00000001c0)=0x8) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[{0x3, 0xc91}], 0x1) ioctl$KVM_RUN(r4, 0xae80, 0x0) 03:34:12 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffe) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) sysinfo(&(0x7f00000003c0)=""/182) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000700)=0x10) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)=ANY=[@ANYBLOB="05000000000000000d0000400500000005000000000100000000005e00000000010000000000000025000000ffffffff00040000040000000a00000006ed"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x186}]}) 03:34:13 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='veth1_to_bond\x00', 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='bbr\x00', 0x4) r1 = socket$inet(0x10, 0x3, 0x10000000000004) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="4c0000001200ff09fffefd956fa283b724a6007900000000000094083540150024001d001fc41179b598bc593afd2068c62b2c192d73a8bfa654a6613b87e658c184510f4d28fcf76aabf35d", 0x4c}], 0x1}, 0x0) 03:34:13 executing program 0: mremap(&(0x7f0000ffa000/0x4000)=nil, 0x6000, 0x10000, 0x0, &(0x7f0000fec000/0x10000)=nil) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='fd/3\x00') getpeername(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000380)=0x80) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ec0)={{{@in=@dev, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000fc0)=0xe8) getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)=ANY=[@ANYBLOB="05000000000000000d0000400500000005000000000100000000005e00000000010000000000000025000000ffffffff00040000040000000a00000006ed"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x186}]}) 03:34:13 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='veth1_to_bond\x00', 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='bbr\x00', 0x4) r1 = socket$inet(0x10, 0x3, 0x10000000000004) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="4c0000001200ff09fffefd956fa283b724a6007900000000000094083540150024001d001fc41179b598bc593afd2068c62b2c192d73a8bfa654a6613b87e658c184510f4d28fcf76aabf35d", 0x4c}], 0x1}, 0x0) 03:34:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)=ANY=[@ANYBLOB="05000000000000000d0000400500000005000000000100000000005e00000000010000000000000025000000ffffffff00040000040000000a00000006ed"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x186}]}) 03:34:13 executing program 3: nanosleep(&(0x7f0000000040), 0x0) eventfd(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) sched_rr_get_interval(0x0, &(0x7f00000000c0)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f00000005c0)='\x00', 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000600), 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000700)=""/81) clock_gettime(0x0, &(0x7f0000000580)) fstat(0xffffffffffffffff, &(0x7f0000000800)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000500)) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000540)={0x14}, 0x14) syz_execute_func(&(0x7f0000000240)="428055a061f36ee9d92a5c41ff0f1837370f38211ac4c4829bdd2520200fee0a9d9d2179fbe5f541754566470f71d600c48179fcdf26bc2ebc0d641e5dc4e1e0120db80000007f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000380)) connect$inet6(0xffffffffffffffff, &(0x7f0000000440)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)={@mcast2}, &(0x7f0000000400)=0x14) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000640)) accept$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @loopback}, &(0x7f0000000200)=0x10) getpgrp(0x0) 03:34:13 executing program 2: request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f0000000140)='mime_type\x00', 0xffffffffffffffff) creat(&(0x7f0000000840)='./file1\x00', 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000500)=""/91) rt_sigqueueinfo(0x0, 0x0, &(0x7f00000002c0)) readlinkat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', &(0x7f0000000640)=""/194, 0xc2) keyctl$setperm(0x5, 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000740)=""/199, &(0x7f00000005c0)=0xc7) socketpair$inet(0x2, 0x0, 0x800000, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000480), 0x4) io_setup(0x0, &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)}, &(0x7f0000000400)) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, @loopback}, 0x1c) gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") 03:34:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000140)=ANY=[@ANYBLOB="05000000000000000d0000400500000005000000000100000000005e00000000010000000000000025000000ffffffff00040000040000000a00000006ed"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x186}]}) 03:34:13 executing program 4: socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000180)) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000640), 0x1) shmget(0xffffffffffffffff, 0x400000, 0x0, &(0x7f0000c00000/0x400000)=nil) getgid() prctl$seccomp(0x16, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000140), 0xe) r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)) getpeername(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000100)=0x80) syz_open_dev$sndpcmp(&(0x7f0000000700)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000740)={0x18}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000600)) get_robust_list(0x0, &(0x7f0000000580)=&(0x7f0000000540)={&(0x7f00000003c0)={&(0x7f0000000380)}, 0x0, &(0x7f0000000500)={&(0x7f0000000400)}}, &(0x7f00000005c0)=0x18) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x2, 0x0, @loopback}, 0xe, &(0x7f0000000200), 0xffffffff}, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000001040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001080)=0x14) bind$bt_hci(0xffffffffffffffff, &(0x7f00000010c0), 0xc) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000001c0)=@req3, 0x1c) preadv(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000440)) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:13 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffe) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) sysinfo(&(0x7f00000003c0)=""/182) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000700)=0x10) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:13 executing program 4: socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000180)) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000640), 0x1) shmget(0xffffffffffffffff, 0x400000, 0x0, &(0x7f0000c00000/0x400000)=nil) getgid() prctl$seccomp(0x16, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000140), 0xe) r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)) getpeername(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000100)=0x80) syz_open_dev$sndpcmp(&(0x7f0000000700)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000740)={0x18}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000600)) get_robust_list(0x0, &(0x7f0000000580)=&(0x7f0000000540)={&(0x7f00000003c0)={&(0x7f0000000380)}, 0x0, &(0x7f0000000500)={&(0x7f0000000400)}}, &(0x7f00000005c0)=0x18) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x2, 0x0, @loopback}, 0xe, &(0x7f0000000200), 0xffffffff}, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000001040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001080)=0x14) bind$bt_hci(0xffffffffffffffff, &(0x7f00000010c0), 0xc) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000001c0)=@req3, 0x1c) preadv(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000440)) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:13 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='setgroups\x00') sendfile(r0, r0, &(0x7f0000000180)=0x300, 0x5) 03:34:13 executing program 0: clock_gettime(0x0, &(0x7f0000000000)={0x0}) setitimer(0x0, &(0x7f0000a0b000)={{0x0, 0x2710}, {r0}}, &(0x7f0000000040)) alarm(0x0) 03:34:14 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='setgroups\x00') sendfile(r0, r0, &(0x7f0000000180)=0x300, 0x5) 03:34:14 executing program 0: clock_gettime(0x0, &(0x7f0000000000)={0x0}) setitimer(0x0, &(0x7f0000a0b000)={{0x0, 0x2710}, {r0}}, &(0x7f0000000040)) alarm(0x0) 03:34:14 executing program 4: socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000180)) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000640), 0x1) shmget(0xffffffffffffffff, 0x400000, 0x0, &(0x7f0000c00000/0x400000)=nil) getgid() prctl$seccomp(0x16, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000140), 0xe) r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)) getpeername(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000100)=0x80) syz_open_dev$sndpcmp(&(0x7f0000000700)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000740)={0x18}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000600)) get_robust_list(0x0, &(0x7f0000000580)=&(0x7f0000000540)={&(0x7f00000003c0)={&(0x7f0000000380)}, 0x0, &(0x7f0000000500)={&(0x7f0000000400)}}, &(0x7f00000005c0)=0x18) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x2, 0x0, @loopback}, 0xe, &(0x7f0000000200), 0xffffffff}, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000001040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001080)=0x14) bind$bt_hci(0xffffffffffffffff, &(0x7f00000010c0), 0xc) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000001c0)=@req3, 0x1c) preadv(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000440)) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:14 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='setgroups\x00') sendfile(r0, r0, &(0x7f0000000180)=0x300, 0x5) 03:34:14 executing program 3: nanosleep(&(0x7f0000000040), 0x0) eventfd(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) sched_rr_get_interval(0x0, &(0x7f00000000c0)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f00000005c0)='\x00', 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000600), 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000700)=""/81) clock_gettime(0x0, &(0x7f0000000580)) fstat(0xffffffffffffffff, &(0x7f0000000800)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000500)) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000540)={0x14}, 0x14) syz_execute_func(&(0x7f0000000240)="428055a061f36ee9d92a5c41ff0f1837370f38211ac4c4829bdd2520200fee0a9d9d2179fbe5f541754566470f71d600c48179fcdf26bc2ebc0d641e5dc4e1e0120db80000007f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000380)) connect$inet6(0xffffffffffffffff, &(0x7f0000000440)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)={@mcast2}, &(0x7f0000000400)=0x14) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000640)) accept$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @loopback}, &(0x7f0000000200)=0x10) getpgrp(0x0) 03:34:14 executing program 2: request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f0000000140)='mime_type\x00', 0xffffffffffffffff) creat(&(0x7f0000000840)='./file1\x00', 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000500)=""/91) rt_sigqueueinfo(0x0, 0x0, &(0x7f00000002c0)) readlinkat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', &(0x7f0000000640)=""/194, 0xc2) keyctl$setperm(0x5, 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000740)=""/199, &(0x7f00000005c0)=0xc7) socketpair$inet(0x2, 0x0, 0x800000, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000480), 0x4) io_setup(0x0, &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)}, &(0x7f0000000400)) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, @loopback}, 0x1c) gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") 03:34:14 executing program 0: clock_gettime(0x0, &(0x7f0000000000)={0x0}) setitimer(0x0, &(0x7f0000a0b000)={{0x0, 0x2710}, {r0}}, &(0x7f0000000040)) alarm(0x0) 03:34:14 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='setgroups\x00') sendfile(r0, r0, &(0x7f0000000180)=0x300, 0x5) 03:34:14 executing program 4: socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000180)) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000640), 0x1) shmget(0xffffffffffffffff, 0x400000, 0x0, &(0x7f0000c00000/0x400000)=nil) getgid() prctl$seccomp(0x16, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000140), 0xe) r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)) getpeername(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000100)=0x80) syz_open_dev$sndpcmp(&(0x7f0000000700)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000740)={0x18}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000600)) get_robust_list(0x0, &(0x7f0000000580)=&(0x7f0000000540)={&(0x7f00000003c0)={&(0x7f0000000380)}, 0x0, &(0x7f0000000500)={&(0x7f0000000400)}}, &(0x7f00000005c0)=0x18) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x2, 0x0, @loopback}, 0xe, &(0x7f0000000200), 0xffffffff}, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000001040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001080)=0x14) bind$bt_hci(0xffffffffffffffff, &(0x7f00000010c0), 0xc) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000001c0)=@req3, 0x1c) preadv(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000440)) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[]}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 03:34:14 executing program 0: clock_gettime(0x0, &(0x7f0000000000)={0x0}) setitimer(0x0, &(0x7f0000a0b000)={{0x0, 0x2710}, {r0}}, &(0x7f0000000040)) alarm(0x0) 03:34:14 executing program 1: recvmmsg(0xffffffffffffff9c, &(0x7f00000035c0)=[{{&(0x7f00000007c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000840)=""/123, 0x7b}, {&(0x7f0000000940)=""/185, 0xb9}, {&(0x7f0000000ac0)=""/115, 0x73}], 0x3, &(0x7f0000000c00)=""/70, 0x46}, 0x4}], 0x1, 0x2, &(0x7f0000001340)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f00000036c0)={0x5, 0x1, 0x5, 0x2}, 0xc) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/netlink\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209}, {&(0x7f0000000380)=""/242}], 0x10000000000002a1, 0x0) 03:34:14 executing program 0: prctl$setname(0x24, &(0x7f0000000180)="5a70726f632970726f63626465762b18fde9bb683026776c616e306e6f6465767365637572690979275b216574683000") msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) memfd_create(&(0x7f0000000500)='/dev/zero\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000780)={@dev, @rand_addr}, &(0x7f0000000940)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001c40)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d40)={{{@in=@remote, @in6=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @dev, @multicast2}, &(0x7f0000001e40)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002040)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004000), &(0x7f0000004040)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004080)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000004180)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000004280), &(0x7f00000042c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004300)={{{@in=@dev, @in=@rand_addr}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000004400)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004440), &(0x7f0000004480)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004cc0)={0x0, @dev, @rand_addr}, &(0x7f0000004d00)=0xc) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:15 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) read(r0, &(0x7f0000ec6000)=""/50, 0x32) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) socketpair$unix(0x1, 0x100000000005, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 03:34:15 executing program 1: recvmmsg(0xffffffffffffff9c, &(0x7f00000035c0)=[{{&(0x7f00000007c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000840)=""/123, 0x7b}, {&(0x7f0000000940)=""/185, 0xb9}, {&(0x7f0000000ac0)=""/115, 0x73}], 0x3, &(0x7f0000000c00)=""/70, 0x46}, 0x4}], 0x1, 0x2, &(0x7f0000001340)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f00000036c0)={0x5, 0x1, 0x5, 0x2}, 0xc) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/netlink\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209}, {&(0x7f0000000380)=""/242}], 0x10000000000002a1, 0x0) 03:34:15 executing program 3: signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) getresuid(&(0x7f0000000500), &(0x7f0000000640), &(0x7f0000000680)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getgid() getpid() fstat(0xffffffffffffffff, &(0x7f0000000b40)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00)) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000025c0)=0xe8) lstat(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000026c0), &(0x7f0000002700)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002740)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000002840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002880), &(0x7f00000028c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getresgid(&(0x7f0000002a40), &(0x7f0000002a80), &(0x7f0000002ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) stat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c40), &(0x7f0000002c80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002cc0), &(0x7f0000002d00)=0xc) lstat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003200)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000003300)=0xe8) getresgid(&(0x7f0000003340), &(0x7f0000003380), &(0x7f00000033c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003400)) stat(&(0x7f0000003440)='./file0\x00', &(0x7f0000003480)) getgroups(0x0, &(0x7f0000003500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003540), &(0x7f0000003580)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000035c0)={{{@in6=@loopback, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@ipv4}, 0x0, @in6=@dev}}, &(0x7f00000036c0)=0xe8) getresgid(&(0x7f0000003700), &(0x7f0000003740), &(0x7f0000003780)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:15 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) read(r0, &(0x7f0000ec6000)=""/50, 0x32) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) socketpair$unix(0x1, 0x100000000005, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 03:34:15 executing program 2: request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f0000000140)='mime_type\x00', 0xffffffffffffffff) creat(&(0x7f0000000840)='./file1\x00', 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000500)=""/91) rt_sigqueueinfo(0x0, 0x0, &(0x7f00000002c0)) readlinkat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', &(0x7f0000000640)=""/194, 0xc2) keyctl$setperm(0x5, 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000740)=""/199, &(0x7f00000005c0)=0xc7) socketpair$inet(0x2, 0x0, 0x800000, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000480), 0x4) io_setup(0x0, &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)}, &(0x7f0000000400)) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, @loopback}, 0x1c) gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") 03:34:15 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[]}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 03:34:15 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) read(r0, &(0x7f0000ec6000)=""/50, 0x32) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) socketpair$unix(0x1, 0x100000000005, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 03:34:15 executing program 1: recvmmsg(0xffffffffffffff9c, &(0x7f00000035c0)=[{{&(0x7f00000007c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000840)=""/123, 0x7b}, {&(0x7f0000000940)=""/185, 0xb9}, {&(0x7f0000000ac0)=""/115, 0x73}], 0x3, &(0x7f0000000c00)=""/70, 0x46}, 0x4}], 0x1, 0x2, &(0x7f0000001340)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f00000036c0)={0x5, 0x1, 0x5, 0x2}, 0xc) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/netlink\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209}, {&(0x7f0000000380)=""/242}], 0x10000000000002a1, 0x0) 03:34:15 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) read(r0, &(0x7f0000ec6000)=""/50, 0x32) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) socketpair$unix(0x1, 0x100000000005, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 03:34:15 executing program 1: recvmmsg(0xffffffffffffff9c, &(0x7f00000035c0)=[{{&(0x7f00000007c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000840)=""/123, 0x7b}, {&(0x7f0000000940)=""/185, 0xb9}, {&(0x7f0000000ac0)=""/115, 0x73}], 0x3, &(0x7f0000000c00)=""/70, 0x46}, 0x4}], 0x1, 0x2, &(0x7f0000001340)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f00000036c0)={0x5, 0x1, 0x5, 0x2}, 0xc) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/netlink\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209}, {&(0x7f0000000380)=""/242}], 0x10000000000002a1, 0x0) 03:34:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[]}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 03:34:16 executing program 0: prctl$setname(0x24, &(0x7f0000000180)="5a70726f632970726f63626465762b18fde9bb683026776c616e306e6f6465767365637572690979275b216574683000") msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) memfd_create(&(0x7f0000000500)='/dev/zero\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000780)={@dev, @rand_addr}, &(0x7f0000000940)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001c40)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d40)={{{@in=@remote, @in6=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @dev, @multicast2}, &(0x7f0000001e40)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002040)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004000), &(0x7f0000004040)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004080)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000004180)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000004280), &(0x7f00000042c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004300)={{{@in=@dev, @in=@rand_addr}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000004400)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004440), &(0x7f0000004480)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004cc0)={0x0, @dev, @rand_addr}, &(0x7f0000004d00)=0xc) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:16 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) 03:34:16 executing program 2: request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f0000000140)='mime_type\x00', 0xffffffffffffffff) creat(&(0x7f0000000840)='./file1\x00', 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000500)=""/91) rt_sigqueueinfo(0x0, 0x0, &(0x7f00000002c0)) readlinkat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', &(0x7f0000000640)=""/194, 0xc2) keyctl$setperm(0x5, 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000740)=""/199, &(0x7f00000005c0)=0xc7) socketpair$inet(0x2, 0x0, 0x800000, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000480), 0x4) io_setup(0x0, &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)}, &(0x7f0000000400)) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, @loopback}, 0x1c) gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") 03:34:16 executing program 3: signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) getresuid(&(0x7f0000000500), &(0x7f0000000640), &(0x7f0000000680)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getgid() getpid() fstat(0xffffffffffffffff, &(0x7f0000000b40)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00)) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000025c0)=0xe8) lstat(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000026c0), &(0x7f0000002700)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002740)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000002840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002880), &(0x7f00000028c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getresgid(&(0x7f0000002a40), &(0x7f0000002a80), &(0x7f0000002ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) stat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c40), &(0x7f0000002c80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002cc0), &(0x7f0000002d00)=0xc) lstat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003200)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000003300)=0xe8) getresgid(&(0x7f0000003340), &(0x7f0000003380), &(0x7f00000033c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003400)) stat(&(0x7f0000003440)='./file0\x00', &(0x7f0000003480)) getgroups(0x0, &(0x7f0000003500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003540), &(0x7f0000003580)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000035c0)={{{@in6=@loopback, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@ipv4}, 0x0, @in6=@dev}}, &(0x7f00000036c0)=0xe8) getresgid(&(0x7f0000003700), &(0x7f0000003740), &(0x7f0000003780)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:16 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) 03:34:16 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) 03:34:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[]}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 03:34:16 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) 03:34:17 executing program 1: listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) semget$private(0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680}) clock_gettime(0x0, &(0x7f0000003380)) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002480)={{{@in6=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000002580)=0xe8) getgid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a80)={{{@in=@dev, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000002b80)=0xe8) getgroups(0x0, &(0x7f0000002bc0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002f00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f40)={{{@in=@loopback, @in6=@ipv4={[], [], @local}}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000003040)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003080), &(0x7f00000030c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004480), &(0x7f00000056c0)=0xc) getgroups(0x0, &(0x7f0000005700)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005740)) geteuid() stat(&(0x7f0000005780)='./file0\x00', &(0x7f00000057c0)) gettid() getresuid(&(0x7f0000005dc0), &(0x7f0000005e00), &(0x7f0000005e40)) getgroups(0x0, &(0x7f0000005e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005ec0), &(0x7f0000005f00)=0xc) getresuid(&(0x7f0000005f40), &(0x7f0000005f80), &(0x7f0000005fc0)) lstat(&(0x7f0000006000)='./file0\x00', &(0x7f0000006040)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000060c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000006400)) getresuid(&(0x7f0000006440), &(0x7f0000006480), &(0x7f00000064c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000006840)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006880)={{{@in6=@local, @in=@local}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000006980)=0xe8) getgroups(0x0, &(0x7f00000069c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000006cc0)) getpid() geteuid() getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006e00), 0x0, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000001280)={0xb}, 0xb) recvmmsg(0xffffffffffffffff, &(0x7f0000003240), 0x0, 0x0, &(0x7f00000033c0)) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000012c0)=ANY=[], &(0x7f00000044c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clock_getres(0x0, &(0x7f0000000080)) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[]}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 03:34:17 executing program 2: prctl$setname(0xf, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000dc0)="428055a0ae6969ef69dc00d90890599059ff0f1824c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") fstat(r0, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x0, &(0x7f0000000b00)=0x7) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x224c, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195, 0x0, 0x0, [], 0x0, 0xf}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000600), &(0x7f0000000640)=0x14) syz_extract_tcp_res$synack(&(0x7f00000003c0), 0x1, 0x0) r3 = open(&(0x7f0000000480)='./file0\x00', 0x432081, 0x3) setsockopt$inet_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000740), 0xfeff) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in6=@loopback}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f00000001c0)=0xc3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000000d00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000f40)={@rand_addr, @multicast2}, &(0x7f0000000140)=0x2d) getpeername$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001140)=0xfffffffffffffe2e) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001380)={{{@in6=@dev, @in=@loopback}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000001480)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f00000014c0), &(0x7f0000001500)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x391, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000780)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001700), &(0x7f0000001740)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000017c0)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001800)={@mcast2}, &(0x7f0000001840)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001880)={@dev, @rand_addr}, &(0x7f00000018c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000e40)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000400)=0xffffffffffffffae) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003840)={{{@in=@local, @in6=@local}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@mcast2}}, &(0x7f0000003940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003a40)={{{@in6=@mcast1}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000003b40)=0xe8) 03:34:17 executing program 0: prctl$setname(0x24, &(0x7f0000000180)="5a70726f632970726f63626465762b18fde9bb683026776c616e306e6f6465767365637572690979275b216574683000") msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) memfd_create(&(0x7f0000000500)='/dev/zero\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000780)={@dev, @rand_addr}, &(0x7f0000000940)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001c40)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d40)={{{@in=@remote, @in6=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @dev, @multicast2}, &(0x7f0000001e40)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002040)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004000), &(0x7f0000004040)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004080)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000004180)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000004280), &(0x7f00000042c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004300)={{{@in=@dev, @in=@rand_addr}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000004400)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004440), &(0x7f0000004480)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004cc0)={0x0, @dev, @rand_addr}, &(0x7f0000004d00)=0xc) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:17 executing program 3: signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) getresuid(&(0x7f0000000500), &(0x7f0000000640), &(0x7f0000000680)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getgid() getpid() fstat(0xffffffffffffffff, &(0x7f0000000b40)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00)) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000025c0)=0xe8) lstat(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000026c0), &(0x7f0000002700)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002740)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000002840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002880), &(0x7f00000028c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getresgid(&(0x7f0000002a40), &(0x7f0000002a80), &(0x7f0000002ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) stat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c40), &(0x7f0000002c80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002cc0), &(0x7f0000002d00)=0xc) lstat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003200)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000003300)=0xe8) getresgid(&(0x7f0000003340), &(0x7f0000003380), &(0x7f00000033c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003400)) stat(&(0x7f0000003440)='./file0\x00', &(0x7f0000003480)) getgroups(0x0, &(0x7f0000003500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003540), &(0x7f0000003580)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000035c0)={{{@in6=@loopback, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@ipv4}, 0x0, @in6=@dev}}, &(0x7f00000036c0)=0xe8) getresgid(&(0x7f0000003700), &(0x7f0000003740), &(0x7f0000003780)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[]}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 03:34:18 executing program 1: listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) semget$private(0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680}) clock_gettime(0x0, &(0x7f0000003380)) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002480)={{{@in6=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000002580)=0xe8) getgid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a80)={{{@in=@dev, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000002b80)=0xe8) getgroups(0x0, &(0x7f0000002bc0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002f00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f40)={{{@in=@loopback, @in6=@ipv4={[], [], @local}}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000003040)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003080), &(0x7f00000030c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004480), &(0x7f00000056c0)=0xc) getgroups(0x0, &(0x7f0000005700)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005740)) geteuid() stat(&(0x7f0000005780)='./file0\x00', &(0x7f00000057c0)) gettid() getresuid(&(0x7f0000005dc0), &(0x7f0000005e00), &(0x7f0000005e40)) getgroups(0x0, &(0x7f0000005e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005ec0), &(0x7f0000005f00)=0xc) getresuid(&(0x7f0000005f40), &(0x7f0000005f80), &(0x7f0000005fc0)) lstat(&(0x7f0000006000)='./file0\x00', &(0x7f0000006040)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000060c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000006400)) getresuid(&(0x7f0000006440), &(0x7f0000006480), &(0x7f00000064c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000006840)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006880)={{{@in6=@local, @in=@local}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000006980)=0xe8) getgroups(0x0, &(0x7f00000069c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000006cc0)) getpid() geteuid() getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006e00), 0x0, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000001280)={0xb}, 0xb) recvmmsg(0xffffffffffffffff, &(0x7f0000003240), 0x0, 0x0, &(0x7f00000033c0)) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000012c0)=ANY=[], &(0x7f00000044c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clock_getres(0x0, &(0x7f0000000080)) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[]}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 03:34:18 executing program 5: prctl$setname(0x35, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0xffffffffffffff7f, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000240)={0x0, @empty, 0x0, 0x0, 'lc\x00'}, 0x2c) syz_execute_func(&(0x7f0000000600)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x0, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000400)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) ioperm(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000340), &(0x7f00000005c0)=0x14) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000540), 0x8) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'tunl0\x00'}) seccomp(0x0, 0x0, &(0x7f0000000100)) bind$rds(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @multicast2}, 0x10) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/qat_adf_ctl\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000006c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001f00), 0x0, 0x0, &(0x7f0000002000)={0x77359400}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002040)={{{@in=@multicast2, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002140)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000021c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002240)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000002640)={&(0x7f0000000680), 0xc, &(0x7f0000002600)={&(0x7f0000002680)=ANY=[]}}, 0x0) 03:34:18 executing program 0: prctl$setname(0x24, &(0x7f0000000180)="5a70726f632970726f63626465762b18fde9bb683026776c616e306e6f6465767365637572690979275b216574683000") msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) memfd_create(&(0x7f0000000500)='/dev/zero\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000780)={@dev, @rand_addr}, &(0x7f0000000940)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001c40)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d40)={{{@in=@remote, @in6=@local}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @dev, @multicast2}, &(0x7f0000001e40)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000001f80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002040)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004000), &(0x7f0000004040)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004080)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000004180)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000004280), &(0x7f00000042c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004300)={{{@in=@dev, @in=@rand_addr}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000004400)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004440), &(0x7f0000004480)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004cc0)={0x0, @dev, @rand_addr}, &(0x7f0000004d00)=0xc) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:18 executing program 3: signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) getresuid(&(0x7f0000000500), &(0x7f0000000640), &(0x7f0000000680)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getgid() getpid() fstat(0xffffffffffffffff, &(0x7f0000000b40)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00)) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) lstat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000025c0)=0xe8) lstat(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000026c0), &(0x7f0000002700)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002740)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000002840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002880), &(0x7f00000028c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002900), &(0x7f0000002940)=0xc) stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getresgid(&(0x7f0000002a40), &(0x7f0000002a80), &(0x7f0000002ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) stat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c40), &(0x7f0000002c80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002cc0), &(0x7f0000002d00)=0xc) lstat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003200)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000003300)=0xe8) getresgid(&(0x7f0000003340), &(0x7f0000003380), &(0x7f00000033c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003400)) stat(&(0x7f0000003440)='./file0\x00', &(0x7f0000003480)) getgroups(0x0, &(0x7f0000003500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003540), &(0x7f0000003580)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000035c0)={{{@in6=@loopback, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@ipv4}, 0x0, @in6=@dev}}, &(0x7f00000036c0)=0xe8) getresgid(&(0x7f0000003700), &(0x7f0000003740), &(0x7f0000003780)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:18 executing program 2: prctl$setname(0xf, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000dc0)="428055a0ae6969ef69dc00d90890599059ff0f1824c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") fstat(r0, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x0, &(0x7f0000000b00)=0x7) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x224c, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195, 0x0, 0x0, [], 0x0, 0xf}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000600), &(0x7f0000000640)=0x14) syz_extract_tcp_res$synack(&(0x7f00000003c0), 0x1, 0x0) r3 = open(&(0x7f0000000480)='./file0\x00', 0x432081, 0x3) setsockopt$inet_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000740), 0xfeff) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in6=@loopback}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f00000001c0)=0xc3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000000d00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000f40)={@rand_addr, @multicast2}, &(0x7f0000000140)=0x2d) getpeername$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001140)=0xfffffffffffffe2e) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001380)={{{@in6=@dev, @in=@loopback}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000001480)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f00000014c0), &(0x7f0000001500)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x391, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000780)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001700), &(0x7f0000001740)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000017c0)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001800)={@mcast2}, &(0x7f0000001840)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001880)={@dev, @rand_addr}, &(0x7f00000018c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000e40)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000400)=0xffffffffffffffae) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003840)={{{@in=@local, @in6=@local}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@mcast2}}, &(0x7f0000003940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003a40)={{{@in6=@mcast1}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000003b40)=0xe8) 03:34:19 executing program 1: listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) semget$private(0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680}) clock_gettime(0x0, &(0x7f0000003380)) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002480)={{{@in6=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000002580)=0xe8) getgid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a80)={{{@in=@dev, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000002b80)=0xe8) getgroups(0x0, &(0x7f0000002bc0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002f00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f40)={{{@in=@loopback, @in6=@ipv4={[], [], @local}}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000003040)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003080), &(0x7f00000030c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004480), &(0x7f00000056c0)=0xc) getgroups(0x0, &(0x7f0000005700)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005740)) geteuid() stat(&(0x7f0000005780)='./file0\x00', &(0x7f00000057c0)) gettid() getresuid(&(0x7f0000005dc0), &(0x7f0000005e00), &(0x7f0000005e40)) getgroups(0x0, &(0x7f0000005e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005ec0), &(0x7f0000005f00)=0xc) getresuid(&(0x7f0000005f40), &(0x7f0000005f80), &(0x7f0000005fc0)) lstat(&(0x7f0000006000)='./file0\x00', &(0x7f0000006040)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000060c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000006400)) getresuid(&(0x7f0000006440), &(0x7f0000006480), &(0x7f00000064c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000006840)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006880)={{{@in6=@local, @in=@local}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000006980)=0xe8) getgroups(0x0, &(0x7f00000069c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000006cc0)) getpid() geteuid() getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006e00), 0x0, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000001280)={0xb}, 0xb) recvmmsg(0xffffffffffffffff, &(0x7f0000003240), 0x0, 0x0, &(0x7f00000033c0)) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000012c0)=ANY=[], &(0x7f00000044c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clock_getres(0x0, &(0x7f0000000080)) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:19 executing program 4: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") chroot(&(0x7f0000000140)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000280)='tunl0\x00') 03:34:19 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000002e80), 0xffffffffffffffff) r1 = getpid() r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) ioctl$UI_SET_SWBIT(r2, 0x80045519, 0x0) 03:34:19 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000002e80), 0xffffffffffffffff) r1 = getpid() r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) ioctl$UI_SET_SWBIT(r2, 0x80045519, 0x0) 03:34:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x26, 0x3fffffffffffff, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 03:34:19 executing program 2: prctl$setname(0xf, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000dc0)="428055a0ae6969ef69dc00d90890599059ff0f1824c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") fstat(r0, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x0, &(0x7f0000000b00)=0x7) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x224c, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195, 0x0, 0x0, [], 0x0, 0xf}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000600), &(0x7f0000000640)=0x14) syz_extract_tcp_res$synack(&(0x7f00000003c0), 0x1, 0x0) r3 = open(&(0x7f0000000480)='./file0\x00', 0x432081, 0x3) setsockopt$inet_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000740), 0xfeff) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in6=@loopback}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f00000001c0)=0xc3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000000d00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000f40)={@rand_addr, @multicast2}, &(0x7f0000000140)=0x2d) getpeername$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001140)=0xfffffffffffffe2e) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001380)={{{@in6=@dev, @in=@loopback}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000001480)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f00000014c0), &(0x7f0000001500)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x391, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000780)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001700), &(0x7f0000001740)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000017c0)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001800)={@mcast2}, &(0x7f0000001840)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001880)={@dev, @rand_addr}, &(0x7f00000018c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000e40)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000400)=0xffffffffffffffae) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003840)={{{@in=@local, @in6=@local}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@mcast2}}, &(0x7f0000003940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003a40)={{{@in6=@mcast1}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000003b40)=0xe8) 03:34:19 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000002e80), 0xffffffffffffffff) r1 = getpid() r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) ioctl$UI_SET_SWBIT(r2, 0x80045519, 0x0) 03:34:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x26, 0x3fffffffffffff, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 03:34:19 executing program 5: prctl$setname(0x35, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0xffffffffffffff7f, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000240)={0x0, @empty, 0x0, 0x0, 'lc\x00'}, 0x2c) syz_execute_func(&(0x7f0000000600)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x0, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000400)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) ioperm(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000340), &(0x7f00000005c0)=0x14) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000540), 0x8) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'tunl0\x00'}) seccomp(0x0, 0x0, &(0x7f0000000100)) bind$rds(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @multicast2}, 0x10) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/qat_adf_ctl\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000006c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001f00), 0x0, 0x0, &(0x7f0000002000)={0x77359400}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002040)={{{@in=@multicast2, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002140)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000021c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002240)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000002640)={&(0x7f0000000680), 0xc, &(0x7f0000002600)={&(0x7f0000002680)=ANY=[]}}, 0x0) 03:34:19 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000002e80), 0xffffffffffffffff) r1 = getpid() r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) ioctl$UI_SET_SWBIT(r2, 0x80045519, 0x0) 03:34:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x26, 0x3fffffffffffff, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 03:34:19 executing program 0: umount2(&(0x7f0000000040)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000900)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10) write$nbd(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getresgid(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f0000000480)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c40), 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@remote, @dev}, &(0x7f00000006c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@local, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00'}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, 0xe8) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:19 executing program 1: listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) semget$private(0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680}) clock_gettime(0x0, &(0x7f0000003380)) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002480)={{{@in6=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000002580)=0xe8) getgid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002a80)={{{@in=@dev, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000002b80)=0xe8) getgroups(0x0, &(0x7f0000002bc0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002f00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f40)={{{@in=@loopback, @in6=@ipv4={[], [], @local}}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000003040)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003080), &(0x7f00000030c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004480), &(0x7f00000056c0)=0xc) getgroups(0x0, &(0x7f0000005700)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005740)) geteuid() stat(&(0x7f0000005780)='./file0\x00', &(0x7f00000057c0)) gettid() getresuid(&(0x7f0000005dc0), &(0x7f0000005e00), &(0x7f0000005e40)) getgroups(0x0, &(0x7f0000005e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005ec0), &(0x7f0000005f00)=0xc) getresuid(&(0x7f0000005f40), &(0x7f0000005f80), &(0x7f0000005fc0)) lstat(&(0x7f0000006000)='./file0\x00', &(0x7f0000006040)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000060c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000006400)) getresuid(&(0x7f0000006440), &(0x7f0000006480), &(0x7f00000064c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000006840)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006880)={{{@in6=@local, @in=@local}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000006980)=0xe8) getgroups(0x0, &(0x7f00000069c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000006cc0)) getpid() geteuid() getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006e00), 0x0, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000001280)={0xb}, 0xb) recvmmsg(0xffffffffffffffff, &(0x7f0000003240), 0x0, 0x0, &(0x7f00000033c0)) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000012c0)=ANY=[], &(0x7f00000044c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clock_getres(0x0, &(0x7f0000000080)) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:20 executing program 4: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") chroot(&(0x7f0000000140)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000280)='tunl0\x00') 03:34:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x26, 0x3fffffffffffff, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 03:34:20 executing program 3: lookup_dcookie(0x0, &(0x7f0000000500)=""/202, 0xca) pipe2$9p(&(0x7f00000000c0), 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000340)) creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)={@mcast2}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001940)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217967f34f0f38f67600e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") pkey_alloc(0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365d40932ebc2ebc0d64c423f57b9000000100221e5d9f7f") 03:34:20 executing program 2: prctl$setname(0xf, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000dc0)="428055a0ae6969ef69dc00d90890599059ff0f1824c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") fstat(r0, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x0, &(0x7f0000000b00)=0x7) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x224c, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195, 0x0, 0x0, [], 0x0, 0xf}, 0x48) getegid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getgid() accept(0xffffffffffffffff, &(0x7f0000000580)=@nfc_llcp, &(0x7f00000000c0)=0x80) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000600), &(0x7f0000000640)=0x14) syz_extract_tcp_res$synack(&(0x7f00000003c0), 0x1, 0x0) r3 = open(&(0x7f0000000480)='./file0\x00', 0x432081, 0x3) setsockopt$inet_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000740), 0xfeff) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in6=@loopback}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f00000001c0)=0xc3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000000d00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000f40)={@rand_addr, @multicast2}, &(0x7f0000000140)=0x2d) getpeername$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001140)=0xfffffffffffffe2e) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001380)={{{@in6=@dev, @in=@loopback}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000001480)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f00000014c0), &(0x7f0000001500)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x391, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000780)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001700), &(0x7f0000001740)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000017c0)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001800)={@mcast2}, &(0x7f0000001840)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001880)={@dev, @rand_addr}, &(0x7f00000018c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000e40)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000400)=0xffffffffffffffae) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003840)={{{@in=@local, @in6=@local}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@mcast2}}, &(0x7f0000003940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003a40)={{{@in6=@mcast1}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000003b40)=0xe8) 03:34:20 executing program 5: prctl$setname(0x35, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0xffffffffffffff7f, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000240)={0x0, @empty, 0x0, 0x0, 'lc\x00'}, 0x2c) syz_execute_func(&(0x7f0000000600)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x0, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000400)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) ioperm(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000340), &(0x7f00000005c0)=0x14) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000540), 0x8) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'tunl0\x00'}) seccomp(0x0, 0x0, &(0x7f0000000100)) bind$rds(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @multicast2}, 0x10) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/qat_adf_ctl\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000006c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001f00), 0x0, 0x0, &(0x7f0000002000)={0x77359400}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002040)={{{@in=@multicast2, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002140)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000021c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002240)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000002640)={&(0x7f0000000680), 0xc, &(0x7f0000002600)={&(0x7f0000002680)=ANY=[]}}, 0x0) 03:34:20 executing program 3: lookup_dcookie(0x0, &(0x7f0000000500)=""/202, 0xca) pipe2$9p(&(0x7f00000000c0), 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000340)) creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)={@mcast2}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001940)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217967f34f0f38f67600e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") pkey_alloc(0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365d40932ebc2ebc0d64c423f57b9000000100221e5d9f7f") 03:34:20 executing program 0: umount2(&(0x7f0000000040)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000900)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10) write$nbd(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getresgid(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f0000000480)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c40), 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@remote, @dev}, &(0x7f00000006c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@local, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00'}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, 0xe8) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:20 executing program 3: lookup_dcookie(0x0, &(0x7f0000000500)=""/202, 0xca) pipe2$9p(&(0x7f00000000c0), 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000340)) creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)={@mcast2}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001940)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217967f34f0f38f67600e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") pkey_alloc(0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365d40932ebc2ebc0d64c423f57b9000000100221e5d9f7f") 03:34:20 executing program 3: lookup_dcookie(0x0, &(0x7f0000000500)=""/202, 0xca) pipe2$9p(&(0x7f00000000c0), 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000340)) creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)={@mcast2}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001940)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217967f34f0f38f67600e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") pkey_alloc(0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365d40932ebc2ebc0d64c423f57b9000000100221e5d9f7f") 03:34:20 executing program 1: signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f00001e3000)=""/30, &(0x7f0000d23000)=0x1e) 03:34:20 executing program 4: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") chroot(&(0x7f0000000140)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000280)='tunl0\x00') 03:34:21 executing program 3: semget(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000140)) fstat(0xffffffffffffff9c, &(0x7f00000001c0)) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)) getegid() openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000840)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000009c0)={0xffffffffffffffff, 0x0, 0x0, 0xd1, &(0x7f0000000880), &(0x7f00000008c0)=""/209}, 0x28) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000400)=0x388) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a40)={0x0, {{0x2, 0x0, @loopback}}}, 0x90) getgid() pipe2(&(0x7f00000006c0), 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000800), 0x4) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a00), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000600)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000640)={0x60}, 0x60) getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e) clock_gettime(0x0, &(0x7f0000000080)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000700)=""/213) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:21 executing program 2: setrlimit(0x7, &(0x7f0000000000)) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socket$rds(0x15, 0x5, 0x0) 03:34:21 executing program 5: prctl$setname(0x35, &(0x7f0000000380)='/dev/midi#\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0xffffffffffffff7f, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000240)={0x0, @empty, 0x0, 0x0, 'lc\x00'}, 0x2c) syz_execute_func(&(0x7f0000000600)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x0, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000400)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) ioperm(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000340), &(0x7f00000005c0)=0x14) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000540), 0x8) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'tunl0\x00'}) seccomp(0x0, 0x0, &(0x7f0000000100)) bind$rds(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @multicast2}, 0x10) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/qat_adf_ctl\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000006c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001f00), 0x0, 0x0, &(0x7f0000002000)={0x77359400}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002040)={{{@in=@multicast2, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002140)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000021c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002240)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000002640)={&(0x7f0000000680), 0xc, &(0x7f0000002600)={&(0x7f0000002680)=ANY=[]}}, 0x0) 03:34:21 executing program 2: keyctl$set_reqkey_keyring(0x16, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x400000000000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getgroups(0x0, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) 03:34:21 executing program 0: umount2(&(0x7f0000000040)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000900)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10) write$nbd(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getresgid(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f0000000480)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c40), 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@remote, @dev}, &(0x7f00000006c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@local, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00'}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, 0xe8) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:21 executing program 1: signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f00001e3000)=""/30, &(0x7f0000d23000)=0x1e) 03:34:21 executing program 4: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") chroot(&(0x7f0000000140)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000280)='tunl0\x00') 03:34:22 executing program 3: semget(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000140)) fstat(0xffffffffffffff9c, &(0x7f00000001c0)) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)) getegid() openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000840)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000009c0)={0xffffffffffffffff, 0x0, 0x0, 0xd1, &(0x7f0000000880), &(0x7f00000008c0)=""/209}, 0x28) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000400)=0x388) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a40)={0x0, {{0x2, 0x0, @loopback}}}, 0x90) getgid() pipe2(&(0x7f00000006c0), 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000800), 0x4) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a00), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000600)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000640)={0x60}, 0x60) getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e) clock_gettime(0x0, &(0x7f0000000080)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000700)=""/213) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:22 executing program 5: r0 = socket(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) 03:34:22 executing program 5: r0 = socket(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) 03:34:22 executing program 0: umount2(&(0x7f0000000040)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000900)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10) write$nbd(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getresgid(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f0000000480)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c40), 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@remote, @dev}, &(0x7f00000006c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@local, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000800)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00'}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, 0xe8) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:22 executing program 2: keyctl$set_reqkey_keyring(0x16, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x400000000000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getgroups(0x0, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) 03:34:22 executing program 5: r0 = socket(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) 03:34:22 executing program 5: r0 = socket(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) 03:34:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x4000089a2, &(0x7f0000000200)={'bridge0\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)}}) 03:34:22 executing program 1: signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f00001e3000)=""/30, &(0x7f0000d23000)=0x1e) 03:34:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x4000089a2, &(0x7f0000000200)={'bridge0\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)}}) 03:34:22 executing program 4: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000080)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x2c0}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000280)) getgroups(0x0, &(0x7f0000000080)) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002740)) fstat(0xffffffffffffffff, &(0x7f0000002b40)) getgid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002bc0), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c00), &(0x7f0000002c40)=0xc) getgid() socket$inet6_udplite(0xa, 0x2, 0x88) stat(&(0x7f00000032c0)='./file0\x00', &(0x7f0000003300)) getresgid(&(0x7f0000003380), &(0x7f00000033c0), &(0x7f0000003400)) lstat(&(0x7f0000003440)='./file0\x00', &(0x7f0000003480)) getgroups(0x0, &(0x7f0000003500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003540)={{{@in=@remote, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000003640)=0xe8) getgroups(0x0, &(0x7f0000003680)) getresuid(&(0x7f00000036c0), &(0x7f0000003700), &(0x7f0000003740)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f00)={{{@in6, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004000)=0xe8) lstat(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004100), &(0x7f0000004140)=0xc) getegid() geteuid() 03:34:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x4000089a2, &(0x7f0000000200)={'bridge0\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)}}) 03:34:23 executing program 3: semget(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000140)) fstat(0xffffffffffffff9c, &(0x7f00000001c0)) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)) getegid() openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000840)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000009c0)={0xffffffffffffffff, 0x0, 0x0, 0xd1, &(0x7f0000000880), &(0x7f00000008c0)=""/209}, 0x28) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000400)=0x388) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a40)={0x0, {{0x2, 0x0, @loopback}}}, 0x90) getgid() pipe2(&(0x7f00000006c0), 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000800), 0x4) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a00), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000600)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000640)={0x60}, 0x60) getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e) clock_gettime(0x0, &(0x7f0000000080)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000700)=""/213) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x4000089a2, &(0x7f0000000200)={'bridge0\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)}}) 03:34:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb0100180000000000000001000000000000002cd4001b25"], &(0x7f0000000180)=""/161, 0x19, 0xa1, 0x1}, 0x20) 03:34:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r0 = gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x2}, 0x14) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x3, @mcast1}}, 0x3f2, 0x3, 0x7f, "b6f49292062716246c2343c7f872d63298dbd81d54ba70010d29e634a6d96a964c08a4a897a41457b17bf87789df9ea281ac5e2cbfa782d37295499445a1cb8cbae0a0794212cb9ad16f21c943408688"}, 0xd8) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)=ANY=[@ANYBLOB="232102000000000000000a"], 0xb) clock_getres(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, r3}, {0x0, 0x9}}, &(0x7f0000040000)) getrlimit(0x0, &(0x7f0000000040)) tkill(r0, 0x1000000000016) 03:34:23 executing program 2: keyctl$set_reqkey_keyring(0x16, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x400000000000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getgroups(0x0, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) 03:34:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb0100180000000000000001000000000000002cd4001b25"], &(0x7f0000000180)=""/161, 0x19, 0xa1, 0x1}, 0x20) 03:34:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb0100180000000000000001000000000000002cd4001b25"], &(0x7f0000000180)=""/161, 0x19, 0xa1, 0x1}, 0x20) 03:34:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r0 = gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x2}, 0x14) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x3, @mcast1}}, 0x3f2, 0x3, 0x7f, "b6f49292062716246c2343c7f872d63298dbd81d54ba70010d29e634a6d96a964c08a4a897a41457b17bf87789df9ea281ac5e2cbfa782d37295499445a1cb8cbae0a0794212cb9ad16f21c943408688"}, 0xd8) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)=ANY=[@ANYBLOB="232102000000000000000a"], 0xb) clock_getres(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, r3}, {0x0, 0x9}}, &(0x7f0000040000)) getrlimit(0x0, &(0x7f0000000040)) tkill(r0, 0x1000000000016) 03:34:23 executing program 1: signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f00001e3000)=""/30, &(0x7f0000d23000)=0x1e) 03:34:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb0100180000000000000001000000000000002cd4001b25"], &(0x7f0000000180)=""/161, 0x19, 0xa1, 0x1}, 0x20) 03:34:23 executing program 4: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000080)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x2c0}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000280)) getgroups(0x0, &(0x7f0000000080)) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002740)) fstat(0xffffffffffffffff, &(0x7f0000002b40)) getgid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002bc0), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c00), &(0x7f0000002c40)=0xc) getgid() socket$inet6_udplite(0xa, 0x2, 0x88) stat(&(0x7f00000032c0)='./file0\x00', &(0x7f0000003300)) getresgid(&(0x7f0000003380), &(0x7f00000033c0), &(0x7f0000003400)) lstat(&(0x7f0000003440)='./file0\x00', &(0x7f0000003480)) getgroups(0x0, &(0x7f0000003500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003540)={{{@in=@remote, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000003640)=0xe8) getgroups(0x0, &(0x7f0000003680)) getresuid(&(0x7f00000036c0), &(0x7f0000003700), &(0x7f0000003740)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f00)={{{@in6, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004000)=0xe8) lstat(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004100), &(0x7f0000004140)=0xc) getegid() geteuid() 03:34:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r0 = gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x2}, 0x14) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x3, @mcast1}}, 0x3f2, 0x3, 0x7f, "b6f49292062716246c2343c7f872d63298dbd81d54ba70010d29e634a6d96a964c08a4a897a41457b17bf87789df9ea281ac5e2cbfa782d37295499445a1cb8cbae0a0794212cb9ad16f21c943408688"}, 0xd8) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)=ANY=[@ANYBLOB="232102000000000000000a"], 0xb) clock_getres(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, r3}, {0x0, 0x9}}, &(0x7f0000040000)) getrlimit(0x0, &(0x7f0000000040)) tkill(r0, 0x1000000000016) 03:34:23 executing program 3: semget(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000140)) fstat(0xffffffffffffff9c, &(0x7f00000001c0)) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)) getegid() openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000840)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000009c0)={0xffffffffffffffff, 0x0, 0x0, 0xd1, &(0x7f0000000880), &(0x7f00000008c0)=""/209}, 0x28) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000400)=0x388) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a40)={0x0, {{0x2, 0x0, @loopback}}}, 0x90) getgid() pipe2(&(0x7f00000006c0), 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000800), 0x4) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a00), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000600)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000640)={0x60}, 0x60) getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e) clock_gettime(0x0, &(0x7f0000000080)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000700)=""/213) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r0 = gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x2}, 0x14) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x3, @mcast1}}, 0x3f2, 0x3, 0x7f, "b6f49292062716246c2343c7f872d63298dbd81d54ba70010d29e634a6d96a964c08a4a897a41457b17bf87789df9ea281ac5e2cbfa782d37295499445a1cb8cbae0a0794212cb9ad16f21c943408688"}, 0xd8) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)=ANY=[@ANYBLOB="232102000000000000000a"], 0xb) clock_getres(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, r3}, {0x0, 0x9}}, &(0x7f0000040000)) getrlimit(0x0, &(0x7f0000000040)) tkill(r0, 0x1000000000016) 03:34:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r0 = gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x2}, 0x14) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x3, @mcast1}}, 0x3f2, 0x3, 0x7f, "b6f49292062716246c2343c7f872d63298dbd81d54ba70010d29e634a6d96a964c08a4a897a41457b17bf87789df9ea281ac5e2cbfa782d37295499445a1cb8cbae0a0794212cb9ad16f21c943408688"}, 0xd8) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)=ANY=[@ANYBLOB="232102000000000000000a"], 0xb) clock_getres(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, r3}, {0x0, 0x9}}, &(0x7f0000040000)) getrlimit(0x0, &(0x7f0000000040)) tkill(r0, 0x1000000000016) 03:34:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r0 = gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x2}, 0x14) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x3, @mcast1}}, 0x3f2, 0x3, 0x7f, "b6f49292062716246c2343c7f872d63298dbd81d54ba70010d29e634a6d96a964c08a4a897a41457b17bf87789df9ea281ac5e2cbfa782d37295499445a1cb8cbae0a0794212cb9ad16f21c943408688"}, 0xd8) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)=ANY=[@ANYBLOB="232102000000000000000a"], 0xb) clock_getres(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, r3}, {0x0, 0x9}}, &(0x7f0000040000)) getrlimit(0x0, &(0x7f0000000040)) tkill(r0, 0x1000000000016) 03:34:24 executing program 2: keyctl$set_reqkey_keyring(0x16, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x400000000000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getgroups(0x0, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) 03:34:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r0 = gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x2}, 0x14) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x3, @mcast1}}, 0x3f2, 0x3, 0x7f, "b6f49292062716246c2343c7f872d63298dbd81d54ba70010d29e634a6d96a964c08a4a897a41457b17bf87789df9ea281ac5e2cbfa782d37295499445a1cb8cbae0a0794212cb9ad16f21c943408688"}, 0xd8) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)=ANY=[@ANYBLOB="232102000000000000000a"], 0xb) clock_getres(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, r3}, {0x0, 0x9}}, &(0x7f0000040000)) getrlimit(0x0, &(0x7f0000000040)) tkill(r0, 0x1000000000016) 03:34:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r0 = gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x2}, 0x14) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x3, @mcast1}}, 0x3f2, 0x3, 0x7f, "b6f49292062716246c2343c7f872d63298dbd81d54ba70010d29e634a6d96a964c08a4a897a41457b17bf87789df9ea281ac5e2cbfa782d37295499445a1cb8cbae0a0794212cb9ad16f21c943408688"}, 0xd8) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)=ANY=[@ANYBLOB="232102000000000000000a"], 0xb) clock_getres(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, r3}, {0x0, 0x9}}, &(0x7f0000040000)) getrlimit(0x0, &(0x7f0000000040)) tkill(r0, 0x1000000000016) 03:34:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r0 = gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x2}, 0x14) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x3, @mcast1}}, 0x3f2, 0x3, 0x7f, "b6f49292062716246c2343c7f872d63298dbd81d54ba70010d29e634a6d96a964c08a4a897a41457b17bf87789df9ea281ac5e2cbfa782d37295499445a1cb8cbae0a0794212cb9ad16f21c943408688"}, 0xd8) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)=ANY=[@ANYBLOB="232102000000000000000a"], 0xb) clock_getres(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, r3}, {0x0, 0x9}}, &(0x7f0000040000)) getrlimit(0x0, &(0x7f0000000040)) tkill(r0, 0x1000000000016) 03:34:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r0 = gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x2}, 0x14) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x3, @mcast1}}, 0x3f2, 0x3, 0x7f, "b6f49292062716246c2343c7f872d63298dbd81d54ba70010d29e634a6d96a964c08a4a897a41457b17bf87789df9ea281ac5e2cbfa782d37295499445a1cb8cbae0a0794212cb9ad16f21c943408688"}, 0xd8) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)=ANY=[@ANYBLOB="232102000000000000000a"], 0xb) clock_getres(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, r3}, {0x0, 0x9}}, &(0x7f0000040000)) getrlimit(0x0, &(0x7f0000000040)) tkill(r0, 0x1000000000016) 03:34:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r0 = gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x2}, 0x14) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x3, @mcast1}}, 0x3f2, 0x3, 0x7f, "b6f49292062716246c2343c7f872d63298dbd81d54ba70010d29e634a6d96a964c08a4a897a41457b17bf87789df9ea281ac5e2cbfa782d37295499445a1cb8cbae0a0794212cb9ad16f21c943408688"}, 0xd8) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)=ANY=[@ANYBLOB="232102000000000000000a"], 0xb) clock_getres(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, r3}, {0x0, 0x9}}, &(0x7f0000040000)) getrlimit(0x0, &(0x7f0000000040)) tkill(r0, 0x1000000000016) 03:34:24 executing program 4: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000080)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x2c0}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000280)) getgroups(0x0, &(0x7f0000000080)) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002740)) fstat(0xffffffffffffffff, &(0x7f0000002b40)) getgid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002bc0), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c00), &(0x7f0000002c40)=0xc) getgid() socket$inet6_udplite(0xa, 0x2, 0x88) stat(&(0x7f00000032c0)='./file0\x00', &(0x7f0000003300)) getresgid(&(0x7f0000003380), &(0x7f00000033c0), &(0x7f0000003400)) lstat(&(0x7f0000003440)='./file0\x00', &(0x7f0000003480)) getgroups(0x0, &(0x7f0000003500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003540)={{{@in=@remote, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000003640)=0xe8) getgroups(0x0, &(0x7f0000003680)) getresuid(&(0x7f00000036c0), &(0x7f0000003700), &(0x7f0000003740)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f00)={{{@in6, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004000)=0xe8) lstat(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004100), &(0x7f0000004140)=0xc) getegid() geteuid() 03:34:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r0 = gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x2}, 0x14) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x3, @mcast1}}, 0x3f2, 0x3, 0x7f, "b6f49292062716246c2343c7f872d63298dbd81d54ba70010d29e634a6d96a964c08a4a897a41457b17bf87789df9ea281ac5e2cbfa782d37295499445a1cb8cbae0a0794212cb9ad16f21c943408688"}, 0xd8) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)=ANY=[@ANYBLOB="232102000000000000000a"], 0xb) clock_getres(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, r3}, {0x0, 0x9}}, &(0x7f0000040000)) getrlimit(0x0, &(0x7f0000000040)) tkill(r0, 0x1000000000016) 03:34:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r0 = gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x2}, 0x14) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x3, @mcast1}}, 0x3f2, 0x3, 0x7f, "b6f49292062716246c2343c7f872d63298dbd81d54ba70010d29e634a6d96a964c08a4a897a41457b17bf87789df9ea281ac5e2cbfa782d37295499445a1cb8cbae0a0794212cb9ad16f21c943408688"}, 0xd8) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)=ANY=[@ANYBLOB="232102000000000000000a"], 0xb) clock_getres(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, r3}, {0x0, 0x9}}, &(0x7f0000040000)) getrlimit(0x0, &(0x7f0000000040)) tkill(r0, 0x1000000000016) 03:34:24 executing program 3: socketpair(0x19, 0x7, 0x3, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz1\x00', 0x200002, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000002c0)={'teql0\x00', 0x600}) socketpair(0x0, 0x0, 0x56e8, &(0x7f0000000500)) openat$cgroup_int(r0, &(0x7f00000004c0)='cpuset.memory_migrate\x00', 0x2, 0x0) 03:34:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r0 = gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x2}, 0x14) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x3, @mcast1}}, 0x3f2, 0x3, 0x7f, "b6f49292062716246c2343c7f872d63298dbd81d54ba70010d29e634a6d96a964c08a4a897a41457b17bf87789df9ea281ac5e2cbfa782d37295499445a1cb8cbae0a0794212cb9ad16f21c943408688"}, 0xd8) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)=ANY=[@ANYBLOB="232102000000000000000a"], 0xb) clock_getres(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, r3}, {0x0, 0x9}}, &(0x7f0000040000)) getrlimit(0x0, &(0x7f0000000040)) tkill(r0, 0x1000000000016) 03:34:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r0 = gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x2}, 0x14) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x3, @mcast1}}, 0x3f2, 0x3, 0x7f, "b6f49292062716246c2343c7f872d63298dbd81d54ba70010d29e634a6d96a964c08a4a897a41457b17bf87789df9ea281ac5e2cbfa782d37295499445a1cb8cbae0a0794212cb9ad16f21c943408688"}, 0xd8) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)=ANY=[@ANYBLOB="232102000000000000000a"], 0xb) clock_getres(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, r3}, {0x0, 0x9}}, &(0x7f0000040000)) getrlimit(0x0, &(0x7f0000000040)) tkill(r0, 0x1000000000016) 03:34:25 executing program 5: getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000b40)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000500)={0x0, 0x0, 0x0, &(0x7f0000000480)}) request_key(&(0x7f0000000240)='id_legacy\x00', &(0x7f0000000280), &(0x7f00000002c0)='-\x00', 0xfffffffffffffffb) syz_genetlink_get_family_id$team(&(0x7f00000008c0)='team\x00') openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000680)={@local}, &(0x7f00000006c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000780)={0x0, @empty, @loopback}, &(0x7f00000007c0)=0xc) accept(0xffffffffffffffff, &(0x7f0000000800)=@can, &(0x7f0000000880)=0x80) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000440)) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@dev, @dev}, &(0x7f0000000f40)=0xc) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f80)={@broadcast, @loopback}, &(0x7f0000000fc0)=0xc) accept4(0xffffffffffffffff, &(0x7f0000000ac0)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000640)=0x80, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in=@remote, @in6}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast1, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000001100)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001140)={0x0, @local, @broadcast}, &(0x7f0000001180)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001200)={&(0x7f0000000040), 0xc, &(0x7f0000000900)={&(0x7f0000000b80)=ANY=[]}}, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001400)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001440)={@local}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f00000005c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000140)=0xe8) openat$zero(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="42805da0510fef69dc0f01ee0dce41cbff91dd91913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="025cc80700") socket(0x0, 0x802, 0x0) 03:34:25 executing program 2: add_key(&(0x7f00000006c0)='big_key\x00', &(0x7f0000000700), &(0x7f0000000840)='Z', 0x1, 0xffffffffffffffff) request_key(&(0x7f0000000740)='asymmetric\x00', &(0x7f00000008c0), &(0x7f0000000900)='\\\x00', 0xfffffffffffffffb) add_key$user(&(0x7f0000000940)='user\x00', &(0x7f0000000980), &(0x7f00000009c0), 0x0, 0xfffffffffffffffc) keyctl$dh_compute(0x18, &(0x7f0000000100), &(0x7f0000000680)=""/5, 0xad, &(0x7f0000000280)={&(0x7f0000000ac0)={'md4\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mknod$loop(&(0x7f00000003c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000380)={0x0, &(0x7f00000002c0)}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000001a40)=""/204) open(&(0x7f0000000640)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000001980)=""/153) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0)) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000800)) 03:34:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r0 = gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x2}, 0x14) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x3, @mcast1}}, 0x3f2, 0x3, 0x7f, "b6f49292062716246c2343c7f872d63298dbd81d54ba70010d29e634a6d96a964c08a4a897a41457b17bf87789df9ea281ac5e2cbfa782d37295499445a1cb8cbae0a0794212cb9ad16f21c943408688"}, 0xd8) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r2, &(0x7f0000002ec0)=ANY=[@ANYBLOB="232102000000000000000a"], 0xb) clock_getres(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, r3}, {0x0, 0x9}}, &(0x7f0000040000)) getrlimit(0x0, &(0x7f0000000040)) tkill(r0, 0x1000000000016) [ 692.005650] binder: 24214:24215 transaction failed 29189/-22, size 0-0 line 2855 03:34:25 executing program 1: memfd_create(&(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, &(0x7f0000000140)=ANY=[]) 03:34:25 executing program 5: alarm(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") [ 692.097990] binder: 24214:24222 transaction failed 29189/-22, size 0-0 line 2855 [ 692.154333] binder: undelivered TRANSACTION_ERROR: 29189 [ 692.183984] binder: undelivered TRANSACTION_ERROR: 29189 03:34:25 executing program 4: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000080)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x2c0}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000280)) getgroups(0x0, &(0x7f0000000080)) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002740)) fstat(0xffffffffffffffff, &(0x7f0000002b40)) getgid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002bc0), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c00), &(0x7f0000002c40)=0xc) getgid() socket$inet6_udplite(0xa, 0x2, 0x88) stat(&(0x7f00000032c0)='./file0\x00', &(0x7f0000003300)) getresgid(&(0x7f0000003380), &(0x7f00000033c0), &(0x7f0000003400)) lstat(&(0x7f0000003440)='./file0\x00', &(0x7f0000003480)) getgroups(0x0, &(0x7f0000003500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003540)={{{@in=@remote, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000003640)=0xe8) getgroups(0x0, &(0x7f0000003680)) getresuid(&(0x7f00000036c0), &(0x7f0000003700), &(0x7f0000003740)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f00)={{{@in6, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000004000)=0xe8) lstat(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004100), &(0x7f0000004140)=0xc) getegid() geteuid() 03:34:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="025cc80700") socket(0x0, 0x802, 0x0) [ 692.417673] binder: 24235:24236 transaction failed 29189/-22, size 0-0 line 2855 03:34:25 executing program 3: socketpair(0x19, 0x7, 0x3, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz1\x00', 0x200002, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000002c0)={'teql0\x00', 0x600}) socketpair(0x0, 0x0, 0x56e8, &(0x7f0000000500)) openat$cgroup_int(r0, &(0x7f00000004c0)='cpuset.memory_migrate\x00', 0x2, 0x0) [ 692.527982] binder: undelivered TRANSACTION_ERROR: 29189 03:34:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="025cc80700") socket(0x0, 0x802, 0x0) [ 692.710645] binder: 24250:24251 transaction failed 29189/-22, size 0-0 line 2855 [ 692.793723] binder: undelivered TRANSACTION_ERROR: 29189 03:34:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="025cc80700") socket(0x0, 0x802, 0x0) 03:34:26 executing program 2: add_key(&(0x7f00000006c0)='big_key\x00', &(0x7f0000000700), &(0x7f0000000840)='Z', 0x1, 0xffffffffffffffff) request_key(&(0x7f0000000740)='asymmetric\x00', &(0x7f00000008c0), &(0x7f0000000900)='\\\x00', 0xfffffffffffffffb) add_key$user(&(0x7f0000000940)='user\x00', &(0x7f0000000980), &(0x7f00000009c0), 0x0, 0xfffffffffffffffc) keyctl$dh_compute(0x18, &(0x7f0000000100), &(0x7f0000000680)=""/5, 0xad, &(0x7f0000000280)={&(0x7f0000000ac0)={'md4\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mknod$loop(&(0x7f00000003c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000380)={0x0, &(0x7f00000002c0)}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000001a40)=""/204) open(&(0x7f0000000640)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000001980)=""/153) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0)) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000800)) [ 692.951300] binder: 24257:24258 transaction failed 29189/-22, size 0-0 line 2855 03:34:26 executing program 5: alarm(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") [ 693.062583] binder: undelivered TRANSACTION_ERROR: 29189 03:34:26 executing program 1: memfd_create(&(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, &(0x7f0000000140)=ANY=[]) 03:34:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="025cc80700") socket(0x0, 0x802, 0x0) 03:34:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="025cc80700") socket(0x0, 0x802, 0x0) [ 693.249626] binder: 24272:24275 transaction failed 29189/-22, size 0-0 line 2855 03:34:26 executing program 3: socketpair(0x19, 0x7, 0x3, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz1\x00', 0x200002, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000002c0)={'teql0\x00', 0x600}) socketpair(0x0, 0x0, 0x56e8, &(0x7f0000000500)) openat$cgroup_int(r0, &(0x7f00000004c0)='cpuset.memory_migrate\x00', 0x2, 0x0) [ 693.356322] binder: undelivered TRANSACTION_ERROR: 29189 [ 693.423600] binder: 24279:24281 transaction failed 29189/-22, size 0-0 line 2855 03:34:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="025cc80700") socket(0x0, 0x802, 0x0) [ 693.549631] binder: undelivered TRANSACTION_ERROR: 29189 03:34:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="025cc80700") socket(0x0, 0x802, 0x0) [ 693.610597] binder: 24288:24292 transaction failed 29189/-22, size 0-0 line 2855 03:34:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="025cc80700") socket(0x0, 0x802, 0x0) [ 693.713680] binder: undelivered TRANSACTION_ERROR: 29189 [ 693.737170] binder: 24294:24295 transaction failed 29189/-22, size 0-0 line 2855 03:34:27 executing program 2: add_key(&(0x7f00000006c0)='big_key\x00', &(0x7f0000000700), &(0x7f0000000840)='Z', 0x1, 0xffffffffffffffff) request_key(&(0x7f0000000740)='asymmetric\x00', &(0x7f00000008c0), &(0x7f0000000900)='\\\x00', 0xfffffffffffffffb) add_key$user(&(0x7f0000000940)='user\x00', &(0x7f0000000980), &(0x7f00000009c0), 0x0, 0xfffffffffffffffc) keyctl$dh_compute(0x18, &(0x7f0000000100), &(0x7f0000000680)=""/5, 0xad, &(0x7f0000000280)={&(0x7f0000000ac0)={'md4\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mknod$loop(&(0x7f00000003c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000380)={0x0, &(0x7f00000002c0)}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000001a40)=""/204) open(&(0x7f0000000640)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000001980)=""/153) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0)) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000800)) [ 693.838924] binder: undelivered TRANSACTION_ERROR: 29189 03:34:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0) r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="025cc80700") socket(0x0, 0x802, 0x0) [ 693.896715] binder: 24299:24302 transaction failed 29189/-22, size 0-0 line 2855 03:34:27 executing program 5: alarm(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") [ 694.025788] binder: undelivered TRANSACTION_ERROR: 29189 03:34:27 executing program 1: memfd_create(&(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, &(0x7f0000000140)=ANY=[]) 03:34:27 executing program 0: inotify_init1(0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getcwd(&(0x7f00000003c0)=""/78, 0x4e) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000440)={'filter\x00'}, &(0x7f00000002c0)=0x44) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x6e, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x14, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 03:34:27 executing program 3: socketpair(0x19, 0x7, 0x3, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz1\x00', 0x200002, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000002c0)={'teql0\x00', 0x600}) socketpair(0x0, 0x0, 0x56e8, &(0x7f0000000500)) openat$cgroup_int(r0, &(0x7f00000004c0)='cpuset.memory_migrate\x00', 0x2, 0x0) 03:34:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xffffffff, 0x4) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)="580000001400add427323b470c458c560a067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffeffe809000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 03:34:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xffffffff, 0x4) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)="580000001400add427323b470c458c560a067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffeffe809000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 03:34:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xffffffff, 0x4) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)="580000001400add427323b470c458c560a067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffeffe809000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 03:34:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xffffffff, 0x4) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)="580000001400add427323b470c458c560a067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffeffe809000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 03:34:28 executing program 2: add_key(&(0x7f00000006c0)='big_key\x00', &(0x7f0000000700), &(0x7f0000000840)='Z', 0x1, 0xffffffffffffffff) request_key(&(0x7f0000000740)='asymmetric\x00', &(0x7f00000008c0), &(0x7f0000000900)='\\\x00', 0xfffffffffffffffb) add_key$user(&(0x7f0000000940)='user\x00', &(0x7f0000000980), &(0x7f00000009c0), 0x0, 0xfffffffffffffffc) keyctl$dh_compute(0x18, &(0x7f0000000100), &(0x7f0000000680)=""/5, 0xad, &(0x7f0000000280)={&(0x7f0000000ac0)={'md4\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mknod$loop(&(0x7f00000003c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000380)={0x0, &(0x7f00000002c0)}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000001a40)=""/204) open(&(0x7f0000000640)='./file0\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000001980)=""/153) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000500)=""/244) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0)) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000800)) 03:34:28 executing program 4: geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@dev, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) getresuid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000580)=0xe8) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f00000008c0)=0xe8) getresuid(&(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000980)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) getresgid(&(0x7f0000000a40), &(0x7f0000000a80), &(0x7f0000000ac0)) getgroups(0x0, &(0x7f0000000b00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:28 executing program 5: alarm(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:34:28 executing program 1: memfd_create(&(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, &(0x7f0000000140)=ANY=[]) 03:34:28 executing program 0: inotify_init1(0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getcwd(&(0x7f00000003c0)=""/78, 0x4e) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000440)={'filter\x00'}, &(0x7f00000002c0)=0x44) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x6e, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x14, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 03:34:28 executing program 3: memfd_create(&(0x7f0000000040)='(@.\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a05e6969ef69dc00d9e3af0fe1ff6920375137c339b52a8e0f38c4c37c6d9ea80000004edba564a70f97f20f2bac090d000000bb00000040428fb07e6767e5417545800f2e8f0850cc293201460f01ee420f820e000000262e6426f30f2b050974020027") 03:34:29 executing program 4: geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@dev, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) getresuid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000580)=0xe8) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f00000008c0)=0xe8) getresuid(&(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000980)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) getresgid(&(0x7f0000000a40), &(0x7f0000000a80), &(0x7f0000000ac0)) getgroups(0x0, &(0x7f0000000b00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:29 executing program 2: clock_adjtime(0x0, &(0x7f00000004c0)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000040)=""/98) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) clock_getres(0x0, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000940)) getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000009c0)) fstat(0xffffffffffffffff, &(0x7f0000000a00)) lstat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000340)) syz_execute_func(&(0x7f0000000040)="428045a0a16969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01370f01ee31a3b786e2989f") sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) 03:34:29 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f00000000c0)={'tunl0\x00', @ifru_addrs=@in={0x2, 0x4e20, @rand_addr}}) 03:34:29 executing program 1: clock_gettime(0xfd010000, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000001140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:29 executing program 0: inotify_init1(0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getcwd(&(0x7f00000003c0)=""/78, 0x4e) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000440)={'filter\x00'}, &(0x7f00000002c0)=0x44) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x6e, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x14, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 03:34:29 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f00000000c0)={'tunl0\x00', @ifru_addrs=@in={0x2, 0x4e20, @rand_addr}}) 03:34:29 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f00000000c0)={'tunl0\x00', @ifru_addrs=@in={0x2, 0x4e20, @rand_addr}}) 03:34:29 executing program 3: memfd_create(&(0x7f0000000040)='(@.\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a05e6969ef69dc00d9e3af0fe1ff6920375137c339b52a8e0f38c4c37c6d9ea80000004edba564a70f97f20f2bac090d000000bb00000040428fb07e6767e5417545800f2e8f0850cc293201460f01ee420f820e000000262e6426f30f2b050974020027") 03:34:29 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f00000000c0)={'tunl0\x00', @ifru_addrs=@in={0x2, 0x4e20, @rand_addr}}) 03:34:29 executing program 5: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) rt_tgsigqueueinfo(r0, r1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0xffffffffffffff80}) read(r3, &(0x7f0000481000)=""/128, 0x80) 03:34:29 executing program 5: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) rt_tgsigqueueinfo(r0, r1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0xffffffffffffff80}) read(r3, &(0x7f0000481000)=""/128, 0x80) 03:34:30 executing program 4: geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@dev, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) getresuid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000580)=0xe8) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f00000008c0)=0xe8) getresuid(&(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000980)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) getresgid(&(0x7f0000000a40), &(0x7f0000000a80), &(0x7f0000000ac0)) getgroups(0x0, &(0x7f0000000b00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:30 executing program 5: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) rt_tgsigqueueinfo(r0, r1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0xffffffffffffff80}) read(r3, &(0x7f0000481000)=""/128, 0x80) 03:34:30 executing program 2: clock_adjtime(0x0, &(0x7f00000004c0)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000040)=""/98) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) clock_getres(0x0, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000940)) getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000009c0)) fstat(0xffffffffffffffff, &(0x7f0000000a00)) lstat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000340)) syz_execute_func(&(0x7f0000000040)="428045a0a16969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01370f01ee31a3b786e2989f") sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) 03:34:30 executing program 5: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) rt_tgsigqueueinfo(r0, r1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0xffffffffffffff80}) read(r3, &(0x7f0000481000)=""/128, 0x80) 03:34:30 executing program 1: clock_gettime(0xfd010000, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000001140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:30 executing program 0: inotify_init1(0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getcwd(&(0x7f00000003c0)=""/78, 0x4e) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000440)={'filter\x00'}, &(0x7f00000002c0)=0x44) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x6e, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x14, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 03:34:30 executing program 5: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) rt_tgsigqueueinfo(r0, r1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0xffffffffffffff80}) read(r3, &(0x7f0000481000)=""/128, 0x80) 03:34:30 executing program 3: memfd_create(&(0x7f0000000040)='(@.\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a05e6969ef69dc00d9e3af0fe1ff6920375137c339b52a8e0f38c4c37c6d9ea80000004edba564a70f97f20f2bac090d000000bb00000040428fb07e6767e5417545800f2e8f0850cc293201460f01ee420f820e000000262e6426f30f2b050974020027") 03:34:30 executing program 5: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) rt_tgsigqueueinfo(r0, r1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0xffffffffffffff80}) read(r3, &(0x7f0000481000)=""/128, 0x80) 03:34:30 executing program 5: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) rt_tgsigqueueinfo(r0, r1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0xffffffffffffff80}) read(r3, &(0x7f0000481000)=""/128, 0x80) 03:34:30 executing program 5: getegid() mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000a00), &(0x7f0000000a40)=0x10) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000580)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, &(0x7f00000001c0)) getegid() getegid() getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:30 executing program 4: geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@dev, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) getresuid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000580)=0xe8) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f00000008c0)=0xe8) getresuid(&(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000980)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) getresgid(&(0x7f0000000a40), &(0x7f0000000a80), &(0x7f0000000ac0)) getgroups(0x0, &(0x7f0000000b00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:31 executing program 2: clock_adjtime(0x0, &(0x7f00000004c0)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000040)=""/98) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) clock_getres(0x0, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000940)) getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000009c0)) fstat(0xffffffffffffffff, &(0x7f0000000a00)) lstat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000340)) syz_execute_func(&(0x7f0000000040)="428045a0a16969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01370f01ee31a3b786e2989f") sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) 03:34:31 executing program 1: clock_gettime(0xfd010000, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000001140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:31 executing program 0: keyctl$set_reqkey_keyring(0x2, 0xfffffffe) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000300)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000004c0)={0x0, 0x7530}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) arch_prctl(0x0, &(0x7f0000000480)) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:31 executing program 3: memfd_create(&(0x7f0000000040)='(@.\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a05e6969ef69dc00d9e3af0fe1ff6920375137c339b52a8e0f38c4c37c6d9ea80000004edba564a70f97f20f2bac090d000000bb00000040428fb07e6767e5417545800f2e8f0850cc293201460f01ee420f820e000000262e6426f30f2b050974020027") 03:34:31 executing program 5: getegid() mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000a00), &(0x7f0000000a40)=0x10) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000580)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, &(0x7f00000001c0)) getegid() getegid() getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:31 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x5, &(0x7f0000000100), 0x0) 03:34:31 executing program 2: clock_adjtime(0x0, &(0x7f00000004c0)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000040)=""/98) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) clock_getres(0x0, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000940)) getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000009c0)) fstat(0xffffffffffffffff, &(0x7f0000000a00)) lstat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000340)) syz_execute_func(&(0x7f0000000040)="428045a0a16969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01370f01ee31a3b786e2989f") sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) 03:34:32 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x5, &(0x7f0000000100), 0x0) 03:34:32 executing program 1: clock_gettime(0xfd010000, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000001140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001900)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@dev, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:32 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x5, &(0x7f0000000100), 0x0) 03:34:32 executing program 0: keyctl$set_reqkey_keyring(0x2, 0xfffffffe) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000300)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000004c0)={0x0, 0x7530}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) arch_prctl(0x0, &(0x7f0000000480)) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:32 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x5, &(0x7f0000000100), 0x0) 03:34:32 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)=0x1) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x800, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f00000004c0)) r2 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) sendto$llc(r2, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) write(r2, &(0x7f0000000200), 0x0) recvmmsg(r2, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, &(0x7f000000c2c0)=[{&(0x7f000000bf00)=""/139, 0x8b}, {&(0x7f000000bfc0)=""/220, 0xdc}, {&(0x7f000000c0c0)=""/93, 0x5d}, {&(0x7f000000c140)=""/193, 0xc1}, {&(0x7f000000c240)=""/115, 0x73}], 0x5, &(0x7f000000c340)=""/106, 0x6a, 0xffffffff}, 0x6}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x10000000000000f7, 0x0, 0x0, 0x7d48bddc}, 0x100000001}], 0x2, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x10000, 0x0) lremovexattr(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)=@known='security.capability\x00') ioctl$SG_GET_VERSION_NUM(r3, 0x2282, &(0x7f0000000600)) recvmmsg(r2, &(0x7f00000064c0)=[{{&(0x7f0000004300)=@ax25, 0x80, &(0x7f0000005640)=[{&(0x7f0000004380)=""/36, 0x24}, {&(0x7f00000043c0)=""/249, 0xf9}, {&(0x7f00000044c0)=""/78, 0x4e}, {&(0x7f0000004540)=""/242, 0xf2}, {&(0x7f0000004640)=""/4096, 0x1000}], 0x5, &(0x7f00000056c0)=""/231, 0xe7, 0xfff}, 0xc}, {{&(0x7f00000057c0)=@alg, 0x80, &(0x7f0000005a80)=[{&(0x7f0000005880)=""/105, 0x69}, {&(0x7f0000005900)=""/48, 0x30}, {&(0x7f00000059c0)=""/175, 0xaf}], 0x3, &(0x7f0000005b00)=""/142, 0x8e, 0x2}, 0x6}, {{0x0, 0x0, &(0x7f0000005cc0)=[{&(0x7f0000005bc0)=""/196, 0xc4}], 0x1, &(0x7f0000005d00)=""/193, 0xc1, 0xde7}, 0xfffffffffffffe00}, {{&(0x7f0000005e00)=@rc, 0x80, &(0x7f0000006040)=[{&(0x7f0000005e80)=""/158, 0x9e}, {&(0x7f0000005f40)=""/208, 0xd0}], 0x2, 0x0, 0x0, 0x294000000000}, 0x80000001}, {{&(0x7f0000006080)=@nl, 0x80, &(0x7f00000063c0)=[{&(0x7f0000006100)=""/225, 0xe1}, {&(0x7f0000006200)=""/208, 0xd0}, {&(0x7f0000006300)=""/143, 0x8f}], 0x3, &(0x7f0000006400)=""/136, 0x88, 0x8}, 0x7}], 0x5, 0x2000, 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000440)={'veth0_to_bridge\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r5, &(0x7f00000004c0), &(0x7f0000000580)=""/104}, 0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) connect$vsock_dgram(r3, &(0x7f0000000340)={0x28, 0x0, 0x2710}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r7, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) mount(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', &(0x7f00000007c0)='bfs\x00', 0x200402, &(0x7f0000000980)="b2ed4379dc12139df0c94085d58a1e626e389b57b4bb3c514b54d88fad1ca90dd074cae85d976b20d0976dc6a65f0ce1139151d2c7e0a1dd6de1fd4762e86d11fbe6e7f1e7998cf0b3c94a76098eeeb49ee12ad6541ba37f221e720175add86bf03ed7543580438034a994479ea7a5f06669338230d5abd7e2463b6b1716b781c572f720023b4a0c3dc80efd6b32746e599a174d28e4c8fd8356154edd210c2de752c61dece1b7a415bd4aa85736c80b8e8be8196d58b4ef4ceee11c232071c20e3a72a2a5243c55f31f32fa278a4a5bf6") dup2(r7, r4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000340)}, 0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r5, 0x84, 0x19, &(0x7f0000000280)={r6, 0x81}, 0x8) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000800)={0x10000004}) 03:34:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x2, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000040), 0x3) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000140)=ANY=[], &(0x7f0000000180)) [ 699.159906] misc userio: Invalid payload size 03:34:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x2, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000040), 0x3) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000140)=ANY=[], &(0x7f0000000180)) [ 699.180447] misc userio: Invalid payload size 03:34:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x2, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000040), 0x3) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000140)=ANY=[], &(0x7f0000000180)) [ 699.303445] misc userio: Invalid payload size 03:34:32 executing program 5: getegid() mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000a00), &(0x7f0000000a40)=0x10) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000580)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, &(0x7f00000001c0)) getegid() getegid() getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000b80), 0xffffffffffffffff) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x2, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000040), 0x3) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000140)=ANY=[], &(0x7f0000000180)) [ 699.400049] misc userio: Invalid payload size [ 699.479307] misc userio: Invalid payload size 03:34:32 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000540)={@link_local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "81182e", 0x44, 0x33, 0x0, @local, @local, {[], @gre}}}}}, &(0x7f0000000000)) 03:34:32 executing program 2: ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x8c4b815a5465c2b1, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) 03:34:33 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000540)={@link_local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "81182e", 0x44, 0x33, 0x0, @local, @local, {[], @gre}}}}}, &(0x7f0000000000)) 03:34:33 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000200)={0x0, @broadcast, @remote}, &(0x7f00000002c0)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000180), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) chroot(&(0x7f0000000280)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)="656d30e65b2d00"}, 0xffffffffffffff00) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000480)='./file0/file0\x00', 0x0) mount(&(0x7f00000001c0)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) 03:34:33 executing program 0: keyctl$set_reqkey_keyring(0x2, 0xfffffffe) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000300)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000004c0)={0x0, 0x7530}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) arch_prctl(0x0, &(0x7f0000000480)) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:33 executing program 2: ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x8c4b815a5465c2b1, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) 03:34:33 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)=0x1) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x800, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f00000004c0)) r2 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) sendto$llc(r2, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) write(r2, &(0x7f0000000200), 0x0) recvmmsg(r2, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, &(0x7f000000c2c0)=[{&(0x7f000000bf00)=""/139, 0x8b}, {&(0x7f000000bfc0)=""/220, 0xdc}, {&(0x7f000000c0c0)=""/93, 0x5d}, {&(0x7f000000c140)=""/193, 0xc1}, {&(0x7f000000c240)=""/115, 0x73}], 0x5, &(0x7f000000c340)=""/106, 0x6a, 0xffffffff}, 0x6}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x10000000000000f7, 0x0, 0x0, 0x7d48bddc}, 0x100000001}], 0x2, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x10000, 0x0) lremovexattr(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)=@known='security.capability\x00') ioctl$SG_GET_VERSION_NUM(r3, 0x2282, &(0x7f0000000600)) recvmmsg(r2, &(0x7f00000064c0)=[{{&(0x7f0000004300)=@ax25, 0x80, &(0x7f0000005640)=[{&(0x7f0000004380)=""/36, 0x24}, {&(0x7f00000043c0)=""/249, 0xf9}, {&(0x7f00000044c0)=""/78, 0x4e}, {&(0x7f0000004540)=""/242, 0xf2}, {&(0x7f0000004640)=""/4096, 0x1000}], 0x5, &(0x7f00000056c0)=""/231, 0xe7, 0xfff}, 0xc}, {{&(0x7f00000057c0)=@alg, 0x80, &(0x7f0000005a80)=[{&(0x7f0000005880)=""/105, 0x69}, {&(0x7f0000005900)=""/48, 0x30}, {&(0x7f00000059c0)=""/175, 0xaf}], 0x3, &(0x7f0000005b00)=""/142, 0x8e, 0x2}, 0x6}, {{0x0, 0x0, &(0x7f0000005cc0)=[{&(0x7f0000005bc0)=""/196, 0xc4}], 0x1, &(0x7f0000005d00)=""/193, 0xc1, 0xde7}, 0xfffffffffffffe00}, {{&(0x7f0000005e00)=@rc, 0x80, &(0x7f0000006040)=[{&(0x7f0000005e80)=""/158, 0x9e}, {&(0x7f0000005f40)=""/208, 0xd0}], 0x2, 0x0, 0x0, 0x294000000000}, 0x80000001}, {{&(0x7f0000006080)=@nl, 0x80, &(0x7f00000063c0)=[{&(0x7f0000006100)=""/225, 0xe1}, {&(0x7f0000006200)=""/208, 0xd0}, {&(0x7f0000006300)=""/143, 0x8f}], 0x3, &(0x7f0000006400)=""/136, 0x88, 0x8}, 0x7}], 0x5, 0x2000, 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000440)={'veth0_to_bridge\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r5, &(0x7f00000004c0), &(0x7f0000000580)=""/104}, 0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) connect$vsock_dgram(r3, &(0x7f0000000340)={0x28, 0x0, 0x2710}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r7, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) mount(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', &(0x7f00000007c0)='bfs\x00', 0x200402, &(0x7f0000000980)="b2ed4379dc12139df0c94085d58a1e626e389b57b4bb3c514b54d88fad1ca90dd074cae85d976b20d0976dc6a65f0ce1139151d2c7e0a1dd6de1fd4762e86d11fbe6e7f1e7998cf0b3c94a76098eeeb49ee12ad6541ba37f221e720175add86bf03ed7543580438034a994479ea7a5f06669338230d5abd7e2463b6b1716b781c572f720023b4a0c3dc80efd6b32746e599a174d28e4c8fd8356154edd210c2de752c61dece1b7a415bd4aa85736c80b8e8be8196d58b4ef4ceee11c232071c20e3a72a2a5243c55f31f32fa278a4a5bf6") dup2(r7, r4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000340)}, 0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r5, 0x84, 0x19, &(0x7f0000000280)={r6, 0x81}, 0x8) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000800)={0x10000004}) 03:34:33 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000540)={@link_local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "81182e", 0x44, 0x33, 0x0, @local, @local, {[], @gre}}}}}, &(0x7f0000000000)) 03:34:33 executing program 2: ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x8c4b815a5465c2b1, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) 03:34:33 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000540)={@link_local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "81182e", 0x44, 0x33, 0x0, @local, @local, {[], @gre}}}}}, &(0x7f0000000000)) 03:34:33 executing program 5: getegid() mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000a00), &(0x7f0000000a40)=0x10) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000580)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, &(0x7f00000001c0)) getegid() getegid() getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:33 executing program 2: ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x8c4b815a5465c2b1, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) 03:34:33 executing program 3: accept(0xffffffffffffff9c, &(0x7f0000000240)=@rc, &(0x7f0000000140)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) getgroups(0x0, &(0x7f00000003c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getuid() lstat(&(0x7f0000000480)='./file0/file0/file0\x00', &(0x7f0000000b80)) stat(&(0x7f0000000c00)='./file0/file0/file0/file0\x00', &(0x7f0000000c40)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) socket$unix(0x1, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001340)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000001440)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001480)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001500)={{{@in6=@mcast1, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000001600)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a80), &(0x7f0000001ac0)=0xc) getgroups(0x0, &(0x7f0000001b00)) getuid() getgroups(0x0, &(0x7f0000001b40)) getresuid(&(0x7f0000001d80), &(0x7f0000001dc0), &(0x7f0000001e00)) lstat(&(0x7f0000001e40)='./file0/file0/file0\x00', &(0x7f0000001e80)) stat(&(0x7f0000001f00)='./file0/file0/file0\x00', &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002640)={{{@in6=@loopback, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000002740)=0xe8) stat(&(0x7f0000002780)='./file0/file0/file0\x00', &(0x7f00000027c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002840)={{{@in6=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000002940)=0xe8) getgroups(0x0, &(0x7f0000002980)) syz_open_dev$rtc(&(0x7f00000029c0)='/dev/rtc#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002a00)={{{@in=@remote, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000002b00)=0xe8) getgroups(0x0, &(0x7f0000002b40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b80), &(0x7f0000002bc0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000004240)) getresgid(&(0x7f00000042c0), &(0x7f0000004300), &(0x7f0000004340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004380)={{{@in6=@local, @in6=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000004480)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000044c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004540)={{{@in=@local, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000004640)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000e80)="42805da08a24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028732742d85d096b2179660f38302fbae5e5e5756547ff17c4410d64ac1ec25d31abb7b79873bb7f") creat(&(0x7f0000001100)='./file0/file0/file0\x00', 0x0) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:33 executing program 3: accept(0xffffffffffffff9c, &(0x7f0000000240)=@rc, &(0x7f0000000140)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) getgroups(0x0, &(0x7f00000003c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getuid() lstat(&(0x7f0000000480)='./file0/file0/file0\x00', &(0x7f0000000b80)) stat(&(0x7f0000000c00)='./file0/file0/file0/file0\x00', &(0x7f0000000c40)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) socket$unix(0x1, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001340)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000001440)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001480)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001500)={{{@in6=@mcast1, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000001600)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a80), &(0x7f0000001ac0)=0xc) getgroups(0x0, &(0x7f0000001b00)) getuid() getgroups(0x0, &(0x7f0000001b40)) getresuid(&(0x7f0000001d80), &(0x7f0000001dc0), &(0x7f0000001e00)) lstat(&(0x7f0000001e40)='./file0/file0/file0\x00', &(0x7f0000001e80)) stat(&(0x7f0000001f00)='./file0/file0/file0\x00', &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002640)={{{@in6=@loopback, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000002740)=0xe8) stat(&(0x7f0000002780)='./file0/file0/file0\x00', &(0x7f00000027c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002840)={{{@in6=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000002940)=0xe8) getgroups(0x0, &(0x7f0000002980)) syz_open_dev$rtc(&(0x7f00000029c0)='/dev/rtc#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002a00)={{{@in=@remote, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000002b00)=0xe8) getgroups(0x0, &(0x7f0000002b40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b80), &(0x7f0000002bc0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000004240)) getresgid(&(0x7f00000042c0), &(0x7f0000004300), &(0x7f0000004340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004380)={{{@in6=@local, @in6=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000004480)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000044c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004540)={{{@in=@local, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000004640)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000e80)="42805da08a24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028732742d85d096b2179660f38302fbae5e5e5756547ff17c4410d64ac1ec25d31abb7b79873bb7f") creat(&(0x7f0000001100)='./file0/file0/file0\x00', 0x0) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:33 executing program 2: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) geteuid() getegid() getpgid(0xffffffffffffffff) geteuid() fstat(0xffffffffffffff9c, &(0x7f0000000b00)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000001e00)) stat(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80)) fstat(0xffffffffffffffff, &(0x7f0000001f00)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001f80)) syz_open_pts(0xffffffffffffff9c, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000001fc0)='/dev/userio\x00', 0x0, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000002000)) openat$kvm(0xffffffffffffff9c, &(0x7f0000002040)='/dev/kvm\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) inotify_init() openat$nullb(0xffffffffffffff9c, &(0x7f0000002080)='/dev/nullb0\x00', 0x0, 0x0) gettid() fstat(0xffffffffffffff9c, &(0x7f00000020c0)) getgid() getpgrp(0xffffffffffffffff) stat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)) lstat(&(0x7f0000002840)='./file0\x00', &(0x7f0000003040)) perf_event_open$cgroup(&(0x7f0000002740)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fanotify_init(0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002880)={0xffffffffffffffff}, 0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002240)="63707561636310e675738c3fe9ac4ad932be00", 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) getpgrp(0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000002b00)) getegid() open$dir(&(0x7f0000002b80)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000002c00), 0x0) eventfd2(0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000002c40)='/dev/kvm\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) getpgrp(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c80)) getresgid(&(0x7f0000002d00), &(0x7f0000002d40), &(0x7f0000002d80)) fcntl$getown(0xffffffffffffff9c, 0x9) getresuid(&(0x7f0000002dc0), &(0x7f0000002e00), &(0x7f0000002e40)) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002f40), 0x0, 0x0) 03:34:34 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000200)={0x0, @broadcast, @remote}, &(0x7f00000002c0)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000180), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) chroot(&(0x7f0000000280)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)="656d30e65b2d00"}, 0xffffffffffffff00) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000480)='./file0/file0\x00', 0x0) mount(&(0x7f00000001c0)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) 03:34:34 executing program 0: keyctl$set_reqkey_keyring(0x2, 0xfffffffe) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000300)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000004c0)={0x0, 0x7530}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) arch_prctl(0x0, &(0x7f0000000480)) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:34 executing program 3: accept(0xffffffffffffff9c, &(0x7f0000000240)=@rc, &(0x7f0000000140)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) getgroups(0x0, &(0x7f00000003c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getuid() lstat(&(0x7f0000000480)='./file0/file0/file0\x00', &(0x7f0000000b80)) stat(&(0x7f0000000c00)='./file0/file0/file0/file0\x00', &(0x7f0000000c40)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) socket$unix(0x1, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001340)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000001440)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001480)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001500)={{{@in6=@mcast1, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000001600)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a80), &(0x7f0000001ac0)=0xc) getgroups(0x0, &(0x7f0000001b00)) getuid() getgroups(0x0, &(0x7f0000001b40)) getresuid(&(0x7f0000001d80), &(0x7f0000001dc0), &(0x7f0000001e00)) lstat(&(0x7f0000001e40)='./file0/file0/file0\x00', &(0x7f0000001e80)) stat(&(0x7f0000001f00)='./file0/file0/file0\x00', &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002640)={{{@in6=@loopback, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000002740)=0xe8) stat(&(0x7f0000002780)='./file0/file0/file0\x00', &(0x7f00000027c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002840)={{{@in6=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000002940)=0xe8) getgroups(0x0, &(0x7f0000002980)) syz_open_dev$rtc(&(0x7f00000029c0)='/dev/rtc#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002a00)={{{@in=@remote, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000002b00)=0xe8) getgroups(0x0, &(0x7f0000002b40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b80), &(0x7f0000002bc0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000004240)) getresgid(&(0x7f00000042c0), &(0x7f0000004300), &(0x7f0000004340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004380)={{{@in6=@local, @in6=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000004480)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000044c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004540)={{{@in=@local, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000004640)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000e80)="42805da08a24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028732742d85d096b2179660f38302fbae5e5e5756547ff17c4410d64ac1ec25d31abb7b79873bb7f") creat(&(0x7f0000001100)='./file0/file0/file0\x00', 0x0) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:34 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)=0x1) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x800, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f00000004c0)) r2 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) sendto$llc(r2, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) write(r2, &(0x7f0000000200), 0x0) recvmmsg(r2, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, &(0x7f000000c2c0)=[{&(0x7f000000bf00)=""/139, 0x8b}, {&(0x7f000000bfc0)=""/220, 0xdc}, {&(0x7f000000c0c0)=""/93, 0x5d}, {&(0x7f000000c140)=""/193, 0xc1}, {&(0x7f000000c240)=""/115, 0x73}], 0x5, &(0x7f000000c340)=""/106, 0x6a, 0xffffffff}, 0x6}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x10000000000000f7, 0x0, 0x0, 0x7d48bddc}, 0x100000001}], 0x2, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x10000, 0x0) lremovexattr(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)=@known='security.capability\x00') ioctl$SG_GET_VERSION_NUM(r3, 0x2282, &(0x7f0000000600)) recvmmsg(r2, &(0x7f00000064c0)=[{{&(0x7f0000004300)=@ax25, 0x80, &(0x7f0000005640)=[{&(0x7f0000004380)=""/36, 0x24}, {&(0x7f00000043c0)=""/249, 0xf9}, {&(0x7f00000044c0)=""/78, 0x4e}, {&(0x7f0000004540)=""/242, 0xf2}, {&(0x7f0000004640)=""/4096, 0x1000}], 0x5, &(0x7f00000056c0)=""/231, 0xe7, 0xfff}, 0xc}, {{&(0x7f00000057c0)=@alg, 0x80, &(0x7f0000005a80)=[{&(0x7f0000005880)=""/105, 0x69}, {&(0x7f0000005900)=""/48, 0x30}, {&(0x7f00000059c0)=""/175, 0xaf}], 0x3, &(0x7f0000005b00)=""/142, 0x8e, 0x2}, 0x6}, {{0x0, 0x0, &(0x7f0000005cc0)=[{&(0x7f0000005bc0)=""/196, 0xc4}], 0x1, &(0x7f0000005d00)=""/193, 0xc1, 0xde7}, 0xfffffffffffffe00}, {{&(0x7f0000005e00)=@rc, 0x80, &(0x7f0000006040)=[{&(0x7f0000005e80)=""/158, 0x9e}, {&(0x7f0000005f40)=""/208, 0xd0}], 0x2, 0x0, 0x0, 0x294000000000}, 0x80000001}, {{&(0x7f0000006080)=@nl, 0x80, &(0x7f00000063c0)=[{&(0x7f0000006100)=""/225, 0xe1}, {&(0x7f0000006200)=""/208, 0xd0}, {&(0x7f0000006300)=""/143, 0x8f}], 0x3, &(0x7f0000006400)=""/136, 0x88, 0x8}, 0x7}], 0x5, 0x2000, 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000440)={'veth0_to_bridge\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r5, &(0x7f00000004c0), &(0x7f0000000580)=""/104}, 0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) connect$vsock_dgram(r3, &(0x7f0000000340)={0x28, 0x0, 0x2710}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r7, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) mount(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', &(0x7f00000007c0)='bfs\x00', 0x200402, &(0x7f0000000980)="b2ed4379dc12139df0c94085d58a1e626e389b57b4bb3c514b54d88fad1ca90dd074cae85d976b20d0976dc6a65f0ce1139151d2c7e0a1dd6de1fd4762e86d11fbe6e7f1e7998cf0b3c94a76098eeeb49ee12ad6541ba37f221e720175add86bf03ed7543580438034a994479ea7a5f06669338230d5abd7e2463b6b1716b781c572f720023b4a0c3dc80efd6b32746e599a174d28e4c8fd8356154edd210c2de752c61dece1b7a415bd4aa85736c80b8e8be8196d58b4ef4ceee11c232071c20e3a72a2a5243c55f31f32fa278a4a5bf6") dup2(r7, r4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000340)}, 0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r5, 0x84, 0x19, &(0x7f0000000280)={r6, 0x81}, 0x8) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000800)={0x10000004}) 03:34:34 executing program 3: accept(0xffffffffffffff9c, &(0x7f0000000240)=@rc, &(0x7f0000000140)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) getgroups(0x0, &(0x7f00000003c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getuid() lstat(&(0x7f0000000480)='./file0/file0/file0\x00', &(0x7f0000000b80)) stat(&(0x7f0000000c00)='./file0/file0/file0/file0\x00', &(0x7f0000000c40)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) socket$unix(0x1, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001340)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000001440)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001480)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001500)={{{@in6=@mcast1, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000001600)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a80), &(0x7f0000001ac0)=0xc) getgroups(0x0, &(0x7f0000001b00)) getuid() getgroups(0x0, &(0x7f0000001b40)) getresuid(&(0x7f0000001d80), &(0x7f0000001dc0), &(0x7f0000001e00)) lstat(&(0x7f0000001e40)='./file0/file0/file0\x00', &(0x7f0000001e80)) stat(&(0x7f0000001f00)='./file0/file0/file0\x00', &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001fc0), &(0x7f0000002000)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002640)={{{@in6=@loopback, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000002740)=0xe8) stat(&(0x7f0000002780)='./file0/file0/file0\x00', &(0x7f00000027c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002840)={{{@in6=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000002940)=0xe8) getgroups(0x0, &(0x7f0000002980)) syz_open_dev$rtc(&(0x7f00000029c0)='/dev/rtc#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002a00)={{{@in=@remote, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000002b00)=0xe8) getgroups(0x0, &(0x7f0000002b40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b80), &(0x7f0000002bc0)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000004240)) getresgid(&(0x7f00000042c0), &(0x7f0000004300), &(0x7f0000004340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004380)={{{@in6=@local, @in6=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000004480)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000044c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004540)={{{@in=@local, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000004640)=0xe8) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000e80)="42805da08a24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028732742d85d096b2179660f38302fbae5e5e5756547ff17c4410d64ac1ec25d31abb7b79873bb7f") creat(&(0x7f0000001100)='./file0/file0/file0\x00', 0x0) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:34 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000200)={0x0, @broadcast, @remote}, &(0x7f00000002c0)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000180), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) chroot(&(0x7f0000000280)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)="656d30e65b2d00"}, 0xffffffffffffff00) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000480)='./file0/file0\x00', 0x0) mount(&(0x7f00000001c0)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) 03:34:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045520, &(0x7f000035dffc)) 03:34:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045520, &(0x7f000035dffc)) 03:34:34 executing program 2: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) geteuid() getegid() getpgid(0xffffffffffffffff) geteuid() fstat(0xffffffffffffff9c, &(0x7f0000000b00)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000001e00)) stat(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80)) fstat(0xffffffffffffffff, &(0x7f0000001f00)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001f80)) syz_open_pts(0xffffffffffffff9c, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000001fc0)='/dev/userio\x00', 0x0, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000002000)) openat$kvm(0xffffffffffffff9c, &(0x7f0000002040)='/dev/kvm\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) inotify_init() openat$nullb(0xffffffffffffff9c, &(0x7f0000002080)='/dev/nullb0\x00', 0x0, 0x0) gettid() fstat(0xffffffffffffff9c, &(0x7f00000020c0)) getgid() getpgrp(0xffffffffffffffff) stat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)) lstat(&(0x7f0000002840)='./file0\x00', &(0x7f0000003040)) perf_event_open$cgroup(&(0x7f0000002740)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fanotify_init(0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002880)={0xffffffffffffffff}, 0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002240)="63707561636310e675738c3fe9ac4ad932be00", 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) getpgrp(0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000002b00)) getegid() open$dir(&(0x7f0000002b80)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000002c00), 0x0) eventfd2(0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000002c40)='/dev/kvm\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) getpgrp(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c80)) getresgid(&(0x7f0000002d00), &(0x7f0000002d40), &(0x7f0000002d80)) fcntl$getown(0xffffffffffffff9c, 0x9) getresuid(&(0x7f0000002dc0), &(0x7f0000002e00), &(0x7f0000002e40)) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002f40), 0x0, 0x0) 03:34:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045520, &(0x7f000035dffc)) 03:34:34 executing program 0: clock_gettime(0x0, &(0x7f0000000400)) clock_settime(0x0, &(0x7f00000003c0)) semget$private(0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000a80)=""/134) seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000b40)=""/4096) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) syz_open_dev$vcsa(&(0x7f00000009c0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a00)) openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000a40)='/dev/vcsa#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000900)=ANY=[], &(0x7f0000000500)) pipe2(&(0x7f0000000200), 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440), 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280), 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) pipe(&(0x7f0000000140)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000006c0)}, 0x0) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:34:34 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000200)={0x0, @broadcast, @remote}, &(0x7f00000002c0)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000180), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) chroot(&(0x7f0000000280)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)="656d30e65b2d00"}, 0xffffffffffffff00) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000480)='./file0/file0\x00', 0x0) mount(&(0x7f00000001c0)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) 03:34:35 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)=0x1) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x800, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f00000004c0)) r2 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) sendto$llc(r2, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) write(r2, &(0x7f0000000200), 0x0) recvmmsg(r2, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, &(0x7f000000c2c0)=[{&(0x7f000000bf00)=""/139, 0x8b}, {&(0x7f000000bfc0)=""/220, 0xdc}, {&(0x7f000000c0c0)=""/93, 0x5d}, {&(0x7f000000c140)=""/193, 0xc1}, {&(0x7f000000c240)=""/115, 0x73}], 0x5, &(0x7f000000c340)=""/106, 0x6a, 0xffffffff}, 0x6}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x10000000000000f7, 0x0, 0x0, 0x7d48bddc}, 0x100000001}], 0x2, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x10000, 0x0) lremovexattr(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)=@known='security.capability\x00') ioctl$SG_GET_VERSION_NUM(r3, 0x2282, &(0x7f0000000600)) recvmmsg(r2, &(0x7f00000064c0)=[{{&(0x7f0000004300)=@ax25, 0x80, &(0x7f0000005640)=[{&(0x7f0000004380)=""/36, 0x24}, {&(0x7f00000043c0)=""/249, 0xf9}, {&(0x7f00000044c0)=""/78, 0x4e}, {&(0x7f0000004540)=""/242, 0xf2}, {&(0x7f0000004640)=""/4096, 0x1000}], 0x5, &(0x7f00000056c0)=""/231, 0xe7, 0xfff}, 0xc}, {{&(0x7f00000057c0)=@alg, 0x80, &(0x7f0000005a80)=[{&(0x7f0000005880)=""/105, 0x69}, {&(0x7f0000005900)=""/48, 0x30}, {&(0x7f00000059c0)=""/175, 0xaf}], 0x3, &(0x7f0000005b00)=""/142, 0x8e, 0x2}, 0x6}, {{0x0, 0x0, &(0x7f0000005cc0)=[{&(0x7f0000005bc0)=""/196, 0xc4}], 0x1, &(0x7f0000005d00)=""/193, 0xc1, 0xde7}, 0xfffffffffffffe00}, {{&(0x7f0000005e00)=@rc, 0x80, &(0x7f0000006040)=[{&(0x7f0000005e80)=""/158, 0x9e}, {&(0x7f0000005f40)=""/208, 0xd0}], 0x2, 0x0, 0x0, 0x294000000000}, 0x80000001}, {{&(0x7f0000006080)=@nl, 0x80, &(0x7f00000063c0)=[{&(0x7f0000006100)=""/225, 0xe1}, {&(0x7f0000006200)=""/208, 0xd0}, {&(0x7f0000006300)=""/143, 0x8f}], 0x3, &(0x7f0000006400)=""/136, 0x88, 0x8}, 0x7}], 0x5, 0x2000, 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000440)={'veth0_to_bridge\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r5, &(0x7f00000004c0), &(0x7f0000000580)=""/104}, 0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) connect$vsock_dgram(r3, &(0x7f0000000340)={0x28, 0x0, 0x2710}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r7, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) mount(&(0x7f00000004c0), &(0x7f0000000500)='./file0\x00', &(0x7f00000007c0)='bfs\x00', 0x200402, &(0x7f0000000980)="b2ed4379dc12139df0c94085d58a1e626e389b57b4bb3c514b54d88fad1ca90dd074cae85d976b20d0976dc6a65f0ce1139151d2c7e0a1dd6de1fd4762e86d11fbe6e7f1e7998cf0b3c94a76098eeeb49ee12ad6541ba37f221e720175add86bf03ed7543580438034a994479ea7a5f06669338230d5abd7e2463b6b1716b781c572f720023b4a0c3dc80efd6b32746e599a174d28e4c8fd8356154edd210c2de752c61dece1b7a415bd4aa85736c80b8e8be8196d58b4ef4ceee11c232071c20e3a72a2a5243c55f31f32fa278a4a5bf6") dup2(r7, r4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000340)}, 0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r5, 0x84, 0x19, &(0x7f0000000280)={r6, 0x81}, 0x8) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000800)={0x10000004}) 03:34:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045520, &(0x7f000035dffc)) 03:34:35 executing program 5: mlockall(0x3) eventfd(0x0) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:34:35 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000200)={0x0, @broadcast, @remote}, &(0x7f00000002c0)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000180), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) chroot(&(0x7f0000000280)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)="656d30e65b2d00"}, 0xffffffffffffff00) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000480)='./file0/file0\x00', 0x0) mount(&(0x7f00000001c0)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) 03:34:35 executing program 2: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) geteuid() getegid() getpgid(0xffffffffffffffff) geteuid() fstat(0xffffffffffffff9c, &(0x7f0000000b00)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000001e00)) stat(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80)) fstat(0xffffffffffffffff, &(0x7f0000001f00)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001f80)) syz_open_pts(0xffffffffffffff9c, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000001fc0)='/dev/userio\x00', 0x0, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000002000)) openat$kvm(0xffffffffffffff9c, &(0x7f0000002040)='/dev/kvm\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) inotify_init() openat$nullb(0xffffffffffffff9c, &(0x7f0000002080)='/dev/nullb0\x00', 0x0, 0x0) gettid() fstat(0xffffffffffffff9c, &(0x7f00000020c0)) getgid() getpgrp(0xffffffffffffffff) stat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)) lstat(&(0x7f0000002840)='./file0\x00', &(0x7f0000003040)) perf_event_open$cgroup(&(0x7f0000002740)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fanotify_init(0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002880)={0xffffffffffffffff}, 0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002240)="63707561636310e675738c3fe9ac4ad932be00", 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) getpgrp(0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000002b00)) getegid() open$dir(&(0x7f0000002b80)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000002c00), 0x0) eventfd2(0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000002c40)='/dev/kvm\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) getpgrp(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c80)) getresgid(&(0x7f0000002d00), &(0x7f0000002d40), &(0x7f0000002d80)) fcntl$getown(0xffffffffffffff9c, 0x9) getresuid(&(0x7f0000002dc0), &(0x7f0000002e00), &(0x7f0000002e40)) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002f40), 0x0, 0x0) 03:34:35 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000200)={0x0, @broadcast, @remote}, &(0x7f00000002c0)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000180), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) chroot(&(0x7f0000000280)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)="656d30e65b2d00"}, 0xffffffffffffff00) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000480)='./file0/file0\x00', 0x0) mount(&(0x7f00000001c0)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) 03:34:35 executing program 0: clock_gettime(0x0, &(0x7f0000000400)) clock_settime(0x0, &(0x7f00000003c0)) semget$private(0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000a80)=""/134) seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000b40)=""/4096) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) syz_open_dev$vcsa(&(0x7f00000009c0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a00)) openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000a40)='/dev/vcsa#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000900)=ANY=[], &(0x7f0000000500)) pipe2(&(0x7f0000000200), 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440), 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280), 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) pipe(&(0x7f0000000140)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000006c0)}, 0x0) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:34:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x2c, &(0x7f0000000040)=0x80000000, 0x4) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x2c, &(0x7f0000000140)=0xff, 0x4) 03:34:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x2c, &(0x7f0000000040)=0x80000000, 0x4) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x2c, &(0x7f0000000140)=0xff, 0x4) 03:34:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x2c, &(0x7f0000000040)=0x80000000, 0x4) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x2c, &(0x7f0000000140)=0xff, 0x4) 03:34:36 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000200)={0x0, @broadcast, @remote}, &(0x7f00000002c0)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000180), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) chroot(&(0x7f0000000280)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)="656d30e65b2d00"}, 0xffffffffffffff00) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000480)='./file0/file0\x00', 0x0) mount(&(0x7f00000001c0)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) 03:34:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x2c, &(0x7f0000000040)=0x80000000, 0x4) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x2c, &(0x7f0000000140)=0xff, 0x4) 03:34:36 executing program 4: shmget(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) add_key(&(0x7f0000000480)='asymmetric\x00', &(0x7f00000004c0), &(0x7f00000008c0), 0x0, 0x0) add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800), 0x0, 0x0, 0x0) request_key(&(0x7f0000000440)="775322b46b6c69737400", &(0x7f0000000840), &(0x7f0000000880)='team0\x00', 0xfffffffffffffffa) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000340)={0x30}, 0x30) keyctl$unlink(0x9, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) dup(0xffffffffffffff9c) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f00000001c0)=""/70) syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) getresgid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000540)) setresgid(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") 03:34:36 executing program 2: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) geteuid() getegid() getpgid(0xffffffffffffffff) geteuid() fstat(0xffffffffffffff9c, &(0x7f0000000b00)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000001e00)) stat(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80)) fstat(0xffffffffffffffff, &(0x7f0000001f00)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001f80)) syz_open_pts(0xffffffffffffff9c, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000001fc0)='/dev/userio\x00', 0x0, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000002000)) openat$kvm(0xffffffffffffff9c, &(0x7f0000002040)='/dev/kvm\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) inotify_init() openat$nullb(0xffffffffffffff9c, &(0x7f0000002080)='/dev/nullb0\x00', 0x0, 0x0) gettid() fstat(0xffffffffffffff9c, &(0x7f00000020c0)) getgid() getpgrp(0xffffffffffffffff) stat(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)) lstat(&(0x7f0000002840)='./file0\x00', &(0x7f0000003040)) perf_event_open$cgroup(&(0x7f0000002740)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fanotify_init(0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002880)={0xffffffffffffffff}, 0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002240)="63707561636310e675738c3fe9ac4ad932be00", 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) getpgrp(0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000002b00)) getegid() open$dir(&(0x7f0000002b80)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000002c00), 0x0) eventfd2(0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000002c40)='/dev/kvm\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) getpgrp(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c80)) getresgid(&(0x7f0000002d00), &(0x7f0000002d40), &(0x7f0000002d80)) fcntl$getown(0xffffffffffffff9c, 0x9) getresuid(&(0x7f0000002dc0), &(0x7f0000002e00), &(0x7f0000002e40)) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002f40), 0x0, 0x0) 03:34:36 executing program 5: mlockall(0x3) eventfd(0x0) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:34:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x6, 0x0, @empty={[0x0, 0x86ddffff]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000775000)) 03:34:36 executing program 0: clock_gettime(0x0, &(0x7f0000000400)) clock_settime(0x0, &(0x7f00000003c0)) semget$private(0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000a80)=""/134) seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000b40)=""/4096) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) syz_open_dev$vcsa(&(0x7f00000009c0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a00)) openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000a40)='/dev/vcsa#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000900)=ANY=[], &(0x7f0000000500)) pipe2(&(0x7f0000000200), 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440), 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280), 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) pipe(&(0x7f0000000140)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000006c0)}, 0x0) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:34:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x6, 0x0, @empty={[0x0, 0x86ddffff]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000775000)) 03:34:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x6, 0x0, @empty={[0x0, 0x86ddffff]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000775000)) 03:34:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x6, 0x0, @empty={[0x0, 0x86ddffff]}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000775000)) 03:34:37 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000000), &(0x7f00000001c0)=0x1) 03:34:37 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'ip_vti0\x00', {0x2, 0x0, @multicast2}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) signalfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f00000006c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) socket$nl_route(0x10, 0x3, 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000500), &(0x7f0000000580)) lstat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d80), &(0x7f0000003dc0)=0xc) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000003e40)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000180)) geteuid() renameat2(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000100)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000640)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000780)={@mcast2}, &(0x7f00000007c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000840)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ec0)={{{@in=@local, @in6=@mcast1}}, {{}, 0x0, @in6}}, &(0x7f0000000fc0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001040)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001080)={@remote}, &(0x7f00000010c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={"6272696467653000000006ce00"}) timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f00000005c0)}}, &(0x7f0000000380)) timer_gettime(0x0, &(0x7f00000004c0)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000680)) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:37 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000000), &(0x7f00000001c0)=0x1) 03:34:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_getaffinity(0x0, 0x8, &(0x7f0000000100)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000140)) open_by_handle_at(r1, &(0x7f0000000180)={0x25, 0x0, "25614b7295449964dba54b18e7d2a40f832f3e696a18f0b6d765849c4a"}, 0x200) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 03:34:37 executing program 4: shmget(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) add_key(&(0x7f0000000480)='asymmetric\x00', &(0x7f00000004c0), &(0x7f00000008c0), 0x0, 0x0) add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800), 0x0, 0x0, 0x0) request_key(&(0x7f0000000440)="775322b46b6c69737400", &(0x7f0000000840), &(0x7f0000000880)='team0\x00', 0xfffffffffffffffa) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000340)={0x30}, 0x30) keyctl$unlink(0x9, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) dup(0xffffffffffffff9c) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f00000001c0)=""/70) syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) getresgid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000540)) setresgid(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") 03:34:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_getaffinity(0x0, 0x8, &(0x7f0000000100)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000140)) open_by_handle_at(r1, &(0x7f0000000180)={0x25, 0x0, "25614b7295449964dba54b18e7d2a40f832f3e696a18f0b6d765849c4a"}, 0x200) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 03:34:37 executing program 5: mlockall(0x3) eventfd(0x0) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:34:37 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000000), &(0x7f00000001c0)=0x1) 03:34:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_getaffinity(0x0, 0x8, &(0x7f0000000100)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000140)) open_by_handle_at(r1, &(0x7f0000000180)={0x25, 0x0, "25614b7295449964dba54b18e7d2a40f832f3e696a18f0b6d765849c4a"}, 0x200) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 03:34:37 executing program 0: clock_gettime(0x0, &(0x7f0000000400)) clock_settime(0x0, &(0x7f00000003c0)) semget$private(0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000a80)=""/134) seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000b40)=""/4096) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) syz_open_dev$vcsa(&(0x7f00000009c0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a00)) openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000a40)='/dev/vcsa#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000900)=ANY=[], &(0x7f0000000500)) pipe2(&(0x7f0000000200), 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, 0xffffffffffffffff) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440), 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280), 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) pipe(&(0x7f0000000140)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000006c0)}, 0x0) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:34:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_getaffinity(0x0, 0x8, &(0x7f0000000100)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000140)) open_by_handle_at(r1, &(0x7f0000000180)={0x25, 0x0, "25614b7295449964dba54b18e7d2a40f832f3e696a18f0b6d765849c4a"}, 0x200) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 03:34:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_getaffinity(0x0, 0x8, &(0x7f0000000100)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000140)) open_by_handle_at(r1, &(0x7f0000000180)={0x25, 0x0, "25614b7295449964dba54b18e7d2a40f832f3e696a18f0b6d765849c4a"}, 0x200) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 03:34:38 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000000), &(0x7f00000001c0)=0x1) 03:34:38 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'ip_vti0\x00', {0x2, 0x0, @multicast2}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) signalfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f00000006c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) socket$nl_route(0x10, 0x3, 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000500), &(0x7f0000000580)) lstat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d80), &(0x7f0000003dc0)=0xc) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000003e40)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000180)) geteuid() renameat2(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000100)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000640)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000780)={@mcast2}, &(0x7f00000007c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000840)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ec0)={{{@in=@local, @in6=@mcast1}}, {{}, 0x0, @in6}}, &(0x7f0000000fc0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001040)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001080)={@remote}, &(0x7f00000010c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={"6272696467653000000006ce00"}) timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f00000005c0)}}, &(0x7f0000000380)) timer_gettime(0x0, &(0x7f00000004c0)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000680)) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_getaffinity(0x0, 0x8, &(0x7f0000000100)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000140)) open_by_handle_at(r1, &(0x7f0000000180)={0x25, 0x0, "25614b7295449964dba54b18e7d2a40f832f3e696a18f0b6d765849c4a"}, 0x200) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 03:34:38 executing program 3: mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)="6b657972696e676b657972696e67cd6370757365747b2c656d31626465765e5b2300"}, 0x10) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @cond}}) symlink(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') eventfd(0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f00000001c0)) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001f00)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f40)={0x0, @empty, @dev}, &(0x7f0000001f80)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001fc0)={'veth0_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@local}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002200)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002240)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000022c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002480)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000025c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002640)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000028c0)={@dev, @rand_addr}, &(0x7f0000002900)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002940)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@loopback}}, &(0x7f0000002a40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002a80)={{{@in, @in6}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000002b80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002bc0)={0x0, @loopback, @dev}, &(0x7f0000002c00)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000003480)={&(0x7f0000000000), 0xc, &(0x7f0000003440)={&(0x7f0000002c40)={0x14}, 0x14}}, 0x0) clock_gettime(0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000001c0)={'gretap0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:38 executing program 4: shmget(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) add_key(&(0x7f0000000480)='asymmetric\x00', &(0x7f00000004c0), &(0x7f00000008c0), 0x0, 0x0) add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800), 0x0, 0x0, 0x0) request_key(&(0x7f0000000440)="775322b46b6c69737400", &(0x7f0000000840), &(0x7f0000000880)='team0\x00', 0xfffffffffffffffa) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000340)={0x30}, 0x30) keyctl$unlink(0x9, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) dup(0xffffffffffffff9c) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f00000001c0)=""/70) syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) getresgid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000540)) setresgid(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") [ 705.425416] cgroup: fork rejected by pids controller in /syz2 03:34:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_getaffinity(0x0, 0x8, &(0x7f0000000100)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000140)) open_by_handle_at(r1, &(0x7f0000000180)={0x25, 0x0, "25614b7295449964dba54b18e7d2a40f832f3e696a18f0b6d765849c4a"}, 0x200) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 03:34:39 executing program 5: mlockall(0x3) eventfd(0x0) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:34:39 executing program 0: sysfs$2(0x3, 0x0, &(0x7f00000001c0)=""/182) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd(0x0) openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) pipe(&(0x7f0000000080)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000340)={'tunl0\x00'}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000), 0x10) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@dev, @local}, &(0x7f0000000500)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@dev, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000540)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003c80)={'team_slave_1\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003cc0)={0x0, @empty, @broadcast}, &(0x7f0000003d00)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000003d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003d80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000003dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003e00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003e40)={'vcan0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004180)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000004280)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004340)={@mcast2}, &(0x7f0000004380)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004480)={@local}, &(0x7f00000044c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004500)={@empty, @rand_addr}, &(0x7f0000004540)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004580)={{{@in6, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000004680)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005fc0)={@loopback}, &(0x7f0000006000)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000006040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006080)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000060c0)={{{@in=@remote, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000061c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000006200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006240)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006280)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000006380)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007840)={0x0, @remote, @rand_addr}, &(0x7f0000007880)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000007a40)={'vcan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007a80)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000007b80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000007bc0), &(0x7f0000007c00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007c40)={'yam0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a080)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f000000a180)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a1c0)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f000000a2c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a380)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a3c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a400)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a700)={{{@in6=@dev, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a800)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a880)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ad80)={{{@in6=@ipv4={[], [], @loopback}, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f000000ae80)=0xe8) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:39 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') pread64(r0, &(0x7f0000000280)=""/12, 0xc4, 0x6) 03:34:39 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') pread64(r0, &(0x7f0000000280)=""/12, 0xc4, 0x6) 03:34:39 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') pread64(r0, &(0x7f0000000280)=""/12, 0xc4, 0x6) 03:34:39 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') pread64(r0, &(0x7f0000000280)=""/12, 0xc4, 0x6) 03:34:39 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'ip_vti0\x00', {0x2, 0x0, @multicast2}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) signalfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f00000006c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) socket$nl_route(0x10, 0x3, 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000500), &(0x7f0000000580)) lstat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d80), &(0x7f0000003dc0)=0xc) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000003e40)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000180)) geteuid() renameat2(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000100)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000640)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000780)={@mcast2}, &(0x7f00000007c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000840)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ec0)={{{@in=@local, @in6=@mcast1}}, {{}, 0x0, @in6}}, &(0x7f0000000fc0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001040)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001080)={@remote}, &(0x7f00000010c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={"6272696467653000000006ce00"}) timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f00000005c0)}}, &(0x7f0000000380)) timer_gettime(0x0, &(0x7f00000004c0)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000680)) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:39 executing program 3: mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)="6b657972696e676b657972696e67cd6370757365747b2c656d31626465765e5b2300"}, 0x10) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @cond}}) symlink(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') eventfd(0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f00000001c0)) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001f00)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f40)={0x0, @empty, @dev}, &(0x7f0000001f80)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001fc0)={'veth0_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@local}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002200)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002240)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000022c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002480)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000025c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002640)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000028c0)={@dev, @rand_addr}, &(0x7f0000002900)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002940)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@loopback}}, &(0x7f0000002a40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002a80)={{{@in, @in6}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000002b80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002bc0)={0x0, @loopback, @dev}, &(0x7f0000002c00)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000003480)={&(0x7f0000000000), 0xc, &(0x7f0000003440)={&(0x7f0000002c40)={0x14}, 0x14}}, 0x0) clock_gettime(0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000001c0)={'gretap0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:40 executing program 0: sysfs$2(0x3, 0x0, &(0x7f00000001c0)=""/182) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd(0x0) openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) pipe(&(0x7f0000000080)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000340)={'tunl0\x00'}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000), 0x10) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@dev, @local}, &(0x7f0000000500)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@dev, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000540)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003c80)={'team_slave_1\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003cc0)={0x0, @empty, @broadcast}, &(0x7f0000003d00)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000003d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003d80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000003dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003e00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003e40)={'vcan0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004180)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000004280)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004340)={@mcast2}, &(0x7f0000004380)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004480)={@local}, &(0x7f00000044c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004500)={@empty, @rand_addr}, &(0x7f0000004540)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004580)={{{@in6, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000004680)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005fc0)={@loopback}, &(0x7f0000006000)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000006040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006080)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000060c0)={{{@in=@remote, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000061c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000006200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006240)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006280)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000006380)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007840)={0x0, @remote, @rand_addr}, &(0x7f0000007880)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000007a40)={'vcan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007a80)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000007b80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000007bc0), &(0x7f0000007c00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007c40)={'yam0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a080)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f000000a180)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a1c0)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f000000a2c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a380)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a3c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a400)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a700)={{{@in6=@dev, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a800)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a880)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ad80)={{{@in6=@ipv4={[], [], @loopback}, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f000000ae80)=0xe8) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:40 executing program 4: shmget(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) add_key(&(0x7f0000000480)='asymmetric\x00', &(0x7f00000004c0), &(0x7f00000008c0), 0x0, 0x0) add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f0000000800), 0x0, 0x0, 0x0) request_key(&(0x7f0000000440)="775322b46b6c69737400", &(0x7f0000000840), &(0x7f0000000880)='team0\x00', 0xfffffffffffffffa) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000340)={0x30}, 0x30) keyctl$unlink(0x9, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) dup(0xffffffffffffff9c) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f00000001c0)=""/70) syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) getresgid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000540)) setresgid(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") 03:34:40 executing program 5: pkey_alloc(0x0, 0x0) pkey_free(0xffffffffffffffff) removexattr(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=@known='trusted.syz\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000080)=0x185) getgid() openat$rfkill(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rfkill\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000004dc0)=ANY=[], 0x0) chroot(&(0x7f00000001c0)='./file0/../file0\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000000c0)) fchownat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) write$vnet(0xffffffffffffffff, &(0x7f0000000280)={0x1, {&(0x7f0000003c40)=""/140, 0x8c, &(0x7f0000003d00)=""/178}}, 0xe4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffff8) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c8400f1837370f38211ac4c19086d9f28fd9410feefa4e2179fbe5e54175455d0f2e1a911a01660ff7f031a3b786e2989f7f") 03:34:40 executing program 3: mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)="6b657972696e676b657972696e67cd6370757365747b2c656d31626465765e5b2300"}, 0x10) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @cond}}) symlink(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') eventfd(0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f00000001c0)) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001f00)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f40)={0x0, @empty, @dev}, &(0x7f0000001f80)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001fc0)={'veth0_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@local}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002200)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002240)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000022c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002480)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000025c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002640)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000028c0)={@dev, @rand_addr}, &(0x7f0000002900)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002940)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@loopback}}, &(0x7f0000002a40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002a80)={{{@in, @in6}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000002b80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002bc0)={0x0, @loopback, @dev}, &(0x7f0000002c00)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000003480)={&(0x7f0000000000), 0xc, &(0x7f0000003440)={&(0x7f0000002c40)={0x14}, 0x14}}, 0x0) clock_gettime(0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000001c0)={'gretap0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:41 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'ip_vti0\x00', {0x2, 0x0, @multicast2}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) signalfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f00000006c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040), 0x8) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) socket$nl_route(0x10, 0x3, 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000500), &(0x7f0000000580)) lstat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d80), &(0x7f0000003dc0)=0xc) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000003e40)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000180)) geteuid() renameat2(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000100)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000640)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000780)={@mcast2}, &(0x7f00000007c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000840)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ec0)={{{@in=@local, @in6=@mcast1}}, {{}, 0x0, @in6}}, &(0x7f0000000fc0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001040)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001080)={@remote}, &(0x7f00000010c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={"6272696467653000000006ce00"}) timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f00000005c0)}}, &(0x7f0000000380)) timer_gettime(0x0, &(0x7f00000004c0)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000680)) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:41 executing program 4: clock_gettime(0xffffffffffffffff, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c00)={@mcast1}, &(0x7f0000000c40)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'vcan0\x00'}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000580)) preadv(0xffffffffffffffff, &(0x7f0000000b80), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000015c0)={&(0x7f0000001540)='IPVS\x00', 0xffffffffffffff9c}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000200), &(0x7f0000000cc0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @dev}}}}, &(0x7f0000000e80)=0xb0) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, &(0x7f0000000240)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, "3aea2ea61b9442d0c82b56e0c329630f083e5d34adf75586797e2c9cd764f7c4ada9ecdc3111f32f0c4f65b49bb07243626ae22215dcfd0f4757b0e37fd2142e8e3a47e6dd4714de355ed94f367550c7baf7fa4809ebdbe2af0e74a4c09c7cff7c36a028fd40159721406eaa7ce1470228d7f5304ac2bb610d8dbebe700d11c2"}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000d00)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000400)=0xe8) getegid() 03:34:41 executing program 3: mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)="6b657972696e676b657972696e67cd6370757365747b2c656d31626465765e5b2300"}, 0x10) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @cond}}) symlink(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') eventfd(0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f00000001c0)) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001f00)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f40)={0x0, @empty, @dev}, &(0x7f0000001f80)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001fc0)={'veth0_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@local}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002200)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002240)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000022c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002480)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000024c0)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000025c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002640)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000028c0)={@dev, @rand_addr}, &(0x7f0000002900)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002940)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@loopback}}, &(0x7f0000002a40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002a80)={{{@in, @in6}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000002b80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002bc0)={0x0, @loopback, @dev}, &(0x7f0000002c00)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000003480)={&(0x7f0000000000), 0xc, &(0x7f0000003440)={&(0x7f0000002c40)={0x14}, 0x14}}, 0x0) clock_gettime(0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000001c0)={'gretap0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:41 executing program 5: pkey_alloc(0x0, 0x0) pkey_free(0xffffffffffffffff) removexattr(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=@known='trusted.syz\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000080)=0x185) getgid() openat$rfkill(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rfkill\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000004dc0)=ANY=[], 0x0) chroot(&(0x7f00000001c0)='./file0/../file0\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000000c0)) fchownat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) write$vnet(0xffffffffffffffff, &(0x7f0000000280)={0x1, {&(0x7f0000003c40)=""/140, 0x8c, &(0x7f0000003d00)=""/178}}, 0xe4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffff8) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c8400f1837370f38211ac4c19086d9f28fd9410feefa4e2179fbe5e54175455d0f2e1a911a01660ff7f031a3b786e2989f7f") 03:34:41 executing program 2: r0 = socket$inet(0x2, 0xa, 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000080)=""/103, 0x67, 0x0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x811b000) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000, 0x7ff}, {}, @cond=[{0x8, 0x9, 0x0, 0x1, 0x0, 0x9}, {0xfffffffffffffffd}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000a40)={"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"}) syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x7fffffff) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00'}, 0x0, 0x200, 0x0, r5, 0x0, 0x1, "73797a30000000000000000000000000000000000000000000000000000000000000ecba0000000000000000000100", &(0x7f0000000180), 0x0, [], [0x80000001, 0x9, 0x8]}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000340)=""/62) socket$inet_dccp(0x2, 0x6, 0x0) 03:34:42 executing program 0: sysfs$2(0x3, 0x0, &(0x7f00000001c0)=""/182) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd(0x0) openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) pipe(&(0x7f0000000080)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000340)={'tunl0\x00'}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000), 0x10) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@dev, @local}, &(0x7f0000000500)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@dev, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000540)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003c80)={'team_slave_1\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003cc0)={0x0, @empty, @broadcast}, &(0x7f0000003d00)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000003d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003d80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000003dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003e00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003e40)={'vcan0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004180)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000004280)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004340)={@mcast2}, &(0x7f0000004380)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004480)={@local}, &(0x7f00000044c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004500)={@empty, @rand_addr}, &(0x7f0000004540)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004580)={{{@in6, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000004680)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005fc0)={@loopback}, &(0x7f0000006000)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000006040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006080)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000060c0)={{{@in=@remote, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000061c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000006200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006240)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006280)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000006380)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007840)={0x0, @remote, @rand_addr}, &(0x7f0000007880)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000007a40)={'vcan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007a80)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000007b80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000007bc0), &(0x7f0000007c00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007c40)={'yam0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a080)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f000000a180)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a1c0)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f000000a2c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a380)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a3c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a400)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a700)={{{@in6=@dev, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a800)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a880)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ad80)={{{@in6=@ipv4={[], [], @loopback}, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f000000ae80)=0xe8) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:42 executing program 1: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@local, @in6}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000a00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000003640), &(0x7f0000003680)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000039c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003a40)={@local}, &(0x7f0000003a80)=0x14) accept4(0xffffffffffffffff, &(0x7f0000003ac0)=@hci, &(0x7f0000003b40)=0x80, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003bc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d40)={{{@in6, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000003e40)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005b40), 0x0, 0x0, &(0x7f0000005c40)={0x77359400}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005c80)={@empty, @dev}, &(0x7f0000005cc0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005d00), &(0x7f0000005d40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007740)={@multicast2, @remote}, &(0x7f0000007780)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007880)={@mcast2}, &(0x7f00000078c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000007900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007940)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000d000)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f000000d100)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000da00)={&(0x7f0000000780), 0xc, &(0x7f000000d9c0)={&(0x7f0000001800)=ANY=[]}}, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000540), 0x10) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)) pivot_root(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000740)={0x7}, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:42 executing program 4: clock_gettime(0xffffffffffffffff, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c00)={@mcast1}, &(0x7f0000000c40)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'vcan0\x00'}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000580)) preadv(0xffffffffffffffff, &(0x7f0000000b80), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000015c0)={&(0x7f0000001540)='IPVS\x00', 0xffffffffffffff9c}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000200), &(0x7f0000000cc0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @dev}}}}, &(0x7f0000000e80)=0xb0) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, &(0x7f0000000240)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, "3aea2ea61b9442d0c82b56e0c329630f083e5d34adf75586797e2c9cd764f7c4ada9ecdc3111f32f0c4f65b49bb07243626ae22215dcfd0f4757b0e37fd2142e8e3a47e6dd4714de355ed94f367550c7baf7fa4809ebdbe2af0e74a4c09c7cff7c36a028fd40159721406eaa7ce1470228d7f5304ac2bb610d8dbebe700d11c2"}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000d00)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000400)=0xe8) getegid() [ 709.016218] IPVS: ftp: loaded support on port[0] = 21 03:34:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000140)=""/244) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000440)={@dev}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@broadcast, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000640)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) getresuid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getegid() fstat(0xffffffffffffffff, &(0x7f0000000940)) getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) getgid() syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:42 executing program 5: pkey_alloc(0x0, 0x0) pkey_free(0xffffffffffffffff) removexattr(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=@known='trusted.syz\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000080)=0x185) getgid() openat$rfkill(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rfkill\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000004dc0)=ANY=[], 0x0) chroot(&(0x7f00000001c0)='./file0/../file0\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000000c0)) fchownat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) write$vnet(0xffffffffffffffff, &(0x7f0000000280)={0x1, {&(0x7f0000003c40)=""/140, 0x8c, &(0x7f0000003d00)=""/178}}, 0xe4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffff8) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c8400f1837370f38211ac4c19086d9f28fd9410feefa4e2179fbe5e54175455d0f2e1a911a01660ff7f031a3b786e2989f7f") 03:34:42 executing program 0: sysfs$2(0x3, 0x0, &(0x7f00000001c0)=""/182) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd(0x0) openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) pipe(&(0x7f0000000080)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000340)={'tunl0\x00'}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000), 0x10) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@dev, @local}, &(0x7f0000000500)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@dev, @in=@remote}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000540)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003c80)={'team_slave_1\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003cc0)={0x0, @empty, @broadcast}, &(0x7f0000003d00)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000003d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003d80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000003dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003e00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003e40)={'vcan0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004180)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000004280)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004340)={@mcast2}, &(0x7f0000004380)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004480)={@local}, &(0x7f00000044c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004500)={@empty, @rand_addr}, &(0x7f0000004540)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004580)={{{@in6, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000004680)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005fc0)={@loopback}, &(0x7f0000006000)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000006040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006080)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000060c0)={{{@in=@remote, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000061c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000006200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006240)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006280)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000006380)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007840)={0x0, @remote, @rand_addr}, &(0x7f0000007880)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000007a40)={'vcan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007a80)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000007b80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000007bc0), &(0x7f0000007c00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007c40)={'yam0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a080)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f000000a180)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a1c0)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f000000a2c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000a380)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a3c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a400)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a700)={{{@in6=@dev, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f000000a800)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000a880)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000ad80)={{{@in6=@ipv4={[], [], @loopback}, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f000000ae80)=0xe8) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:43 executing program 1: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@local, @in6}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000a00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000003640), &(0x7f0000003680)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000039c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003a40)={@local}, &(0x7f0000003a80)=0x14) accept4(0xffffffffffffffff, &(0x7f0000003ac0)=@hci, &(0x7f0000003b40)=0x80, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003bc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d40)={{{@in6, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000003e40)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005b40), 0x0, 0x0, &(0x7f0000005c40)={0x77359400}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005c80)={@empty, @dev}, &(0x7f0000005cc0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005d00), &(0x7f0000005d40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007740)={@multicast2, @remote}, &(0x7f0000007780)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007880)={@mcast2}, &(0x7f00000078c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000007900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007940)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000d000)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f000000d100)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000da00)={&(0x7f0000000780), 0xc, &(0x7f000000d9c0)={&(0x7f0000001800)=ANY=[]}}, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000540), 0x10) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)) pivot_root(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000740)={0x7}, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:43 executing program 4: clock_gettime(0xffffffffffffffff, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c00)={@mcast1}, &(0x7f0000000c40)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'vcan0\x00'}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000580)) preadv(0xffffffffffffffff, &(0x7f0000000b80), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000015c0)={&(0x7f0000001540)='IPVS\x00', 0xffffffffffffff9c}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000200), &(0x7f0000000cc0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @dev}}}}, &(0x7f0000000e80)=0xb0) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, &(0x7f0000000240)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, "3aea2ea61b9442d0c82b56e0c329630f083e5d34adf75586797e2c9cd764f7c4ada9ecdc3111f32f0c4f65b49bb07243626ae22215dcfd0f4757b0e37fd2142e8e3a47e6dd4714de355ed94f367550c7baf7fa4809ebdbe2af0e74a4c09c7cff7c36a028fd40159721406eaa7ce1470228d7f5304ac2bb610d8dbebe700d11c2"}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000d00)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000400)=0xe8) getegid() 03:34:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000140)=""/244) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000440)={@dev}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@broadcast, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000640)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) getresuid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getegid() fstat(0xffffffffffffffff, &(0x7f0000000940)) getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) getgid() syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:43 executing program 5: pkey_alloc(0x0, 0x0) pkey_free(0xffffffffffffffff) removexattr(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=@known='trusted.syz\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000080)=0x185) getgid() openat$rfkill(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rfkill\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000004dc0)=ANY=[], 0x0) chroot(&(0x7f00000001c0)='./file0/../file0\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) open(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000000c0)) fchownat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) write$vnet(0xffffffffffffffff, &(0x7f0000000280)={0x1, {&(0x7f0000003c40)=""/140, 0x8c, &(0x7f0000003d00)=""/178}}, 0xe4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000008c0), 0x0, 0x0, 0xfffffffffffffff8) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c8400f1837370f38211ac4c19086d9f28fd9410feefa4e2179fbe5e54175455d0f2e1a911a01660ff7f031a3b786e2989f7f") 03:34:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000300)={'team_slave_1\x00', {0x2, 0x0, @multicast2}}) clock_gettime(0x0, &(0x7f0000000140)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.type\x00', 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000640)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f00000006c0)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f0000000340)) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) creat(&(0x7f0000000500)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000540), 0x40001ce, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f00000000c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000280)=0xe8) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") [ 712.343142] device bridge_slave_1 left promiscuous mode [ 712.348743] bridge0: port 2(bridge_slave_1) entered disabled state [ 712.423036] device bridge_slave_0 left promiscuous mode [ 712.428516] bridge0: port 1(bridge_slave_0) entered disabled state [ 714.524822] team0 (unregistering): Port device team_slave_1 removed [ 714.537852] team0 (unregistering): Port device team_slave_0 removed [ 714.547679] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 714.587797] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 714.665610] bond0 (unregistering): Released all slaves [ 714.778481] bridge0: port 1(bridge_slave_0) entered blocking state [ 714.785971] bridge0: port 1(bridge_slave_0) entered disabled state [ 714.793218] device bridge_slave_0 entered promiscuous mode [ 714.820537] bridge0: port 2(bridge_slave_1) entered blocking state [ 714.827374] bridge0: port 2(bridge_slave_1) entered disabled state [ 714.834969] device bridge_slave_1 entered promiscuous mode [ 714.877283] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 714.921612] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 715.055354] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 715.101835] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 715.319717] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 715.327961] team0: Port device team_slave_0 added [ 715.371270] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 715.378875] team0: Port device team_slave_1 added [ 715.425019] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 715.474967] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 715.521927] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 715.529157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 715.546163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 715.581692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 716.033979] bridge0: port 2(bridge_slave_1) entered blocking state [ 716.040351] bridge0: port 2(bridge_slave_1) entered forwarding state [ 716.047041] bridge0: port 1(bridge_slave_0) entered blocking state [ 716.053456] bridge0: port 1(bridge_slave_0) entered forwarding state [ 716.061385] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 716.822263] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 717.135908] 8021q: adding VLAN 0 to HW filter on device bond0 [ 717.232415] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 717.320750] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 717.327107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 717.335542] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 717.423357] 8021q: adding VLAN 0 to HW filter on device team0 [ 718.018718] bridge0: port 2(bridge_slave_1) entered disabled state [ 718.032496] bridge0: port 1(bridge_slave_0) entered disabled state [ 718.086440] bridge0: port 2(bridge_slave_1) entered blocking state [ 718.092884] bridge0: port 2(bridge_slave_1) entered forwarding state [ 718.099536] bridge0: port 1(bridge_slave_0) entered blocking state [ 718.106022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 718.113643] device bridge0 entered promiscuous mode [ 718.119432] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 718.143325] bridge0: port 2(bridge_slave_1) entered disabled state [ 718.149832] bridge0: port 1(bridge_slave_0) entered disabled state [ 718.157704] device bridge0 left promiscuous mode [ 718.164233] bridge0: port 2(bridge_slave_1) entered blocking state [ 718.170674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 718.177468] bridge0: port 1(bridge_slave_0) entered blocking state [ 718.183902] bridge0: port 1(bridge_slave_0) entered forwarding state 03:34:51 executing program 2: r0 = socket$inet(0x2, 0xa, 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000080)=""/103, 0x67, 0x0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x811b000) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000, 0x7ff}, {}, @cond=[{0x8, 0x9, 0x0, 0x1, 0x0, 0x9}, {0xfffffffffffffffd}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000a40)={"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"}) syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x7fffffff) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00'}, 0x0, 0x200, 0x0, r5, 0x0, 0x1, "73797a30000000000000000000000000000000000000000000000000000000000000ecba0000000000000000000100", &(0x7f0000000180), 0x0, [], [0x80000001, 0x9, 0x8]}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000340)=""/62) socket$inet_dccp(0x2, 0x6, 0x0) 03:34:51 executing program 4: clock_gettime(0xffffffffffffffff, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000c00)={@mcast1}, &(0x7f0000000c40)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'vcan0\x00'}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000580)) preadv(0xffffffffffffffff, &(0x7f0000000b80), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000015c0)={&(0x7f0000001540)='IPVS\x00', 0xffffffffffffff9c}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000200), &(0x7f0000000cc0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @dev}}}}, &(0x7f0000000e80)=0xb0) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, &(0x7f0000000240)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, "3aea2ea61b9442d0c82b56e0c329630f083e5d34adf75586797e2c9cd764f7c4ada9ecdc3111f32f0c4f65b49bb07243626ae22215dcfd0f4757b0e37fd2142e8e3a47e6dd4714de355ed94f367550c7baf7fa4809ebdbe2af0e74a4c09c7cff7c36a028fd40159721406eaa7ce1470228d7f5304ac2bb610d8dbebe700d11c2"}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000d00)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000400)=0xe8) getegid() 03:34:51 executing program 1: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@local, @in6}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000a00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000003640), &(0x7f0000003680)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000039c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003a40)={@local}, &(0x7f0000003a80)=0x14) accept4(0xffffffffffffffff, &(0x7f0000003ac0)=@hci, &(0x7f0000003b40)=0x80, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003bc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d40)={{{@in6, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000003e40)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005b40), 0x0, 0x0, &(0x7f0000005c40)={0x77359400}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005c80)={@empty, @dev}, &(0x7f0000005cc0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005d00), &(0x7f0000005d40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007740)={@multicast2, @remote}, &(0x7f0000007780)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007880)={@mcast2}, &(0x7f00000078c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000007900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007940)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000d000)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f000000d100)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000da00)={&(0x7f0000000780), 0xc, &(0x7f000000d9c0)={&(0x7f0000001800)=ANY=[]}}, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000540), 0x10) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)) pivot_root(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000740)={0x7}, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000140)=""/244) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000440)={@dev}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@broadcast, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000640)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) getresuid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getegid() fstat(0xffffffffffffffff, &(0x7f0000000940)) getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) getgid() syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:51 executing program 5: socket$inet6(0xa, 0x3, 0x1a) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000009c0)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)) recvfrom(0xffffffffffffffff, &(0x7f0000000a00)=""/156, 0x9c, 0x40012000, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000004c0), 0x0, 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f00000007c0)={r2}, &(0x7f0000000800)=""/208, 0xd0, &(0x7f0000000100)={&(0x7f0000000900)={'crct10dif\x00'}, &(0x7f0000000940)}) waitid(0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x0, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f0000000200)='cpu.stat\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000080), &(0x7f0000000140)}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000240), 0x0) socketpair$inet(0x1e, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000ac0)={0x5, 0x10000, 0x279c}) connect$unix(r4, &(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e) 03:34:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000300)={'team_slave_1\x00', {0x2, 0x0, @multicast2}}) clock_gettime(0x0, &(0x7f0000000140)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.type\x00', 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000640)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f00000006c0)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f0000000340)) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) creat(&(0x7f0000000500)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000540), 0x40001ce, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f00000000c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000280)=0xe8) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") [ 718.191596] device bridge0 entered promiscuous mode [ 718.197247] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 03:34:51 executing program 5: socket$inet6(0xa, 0x3, 0x1a) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000009c0)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)) recvfrom(0xffffffffffffffff, &(0x7f0000000a00)=""/156, 0x9c, 0x40012000, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000004c0), 0x0, 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f00000007c0)={r2}, &(0x7f0000000800)=""/208, 0xd0, &(0x7f0000000100)={&(0x7f0000000900)={'crct10dif\x00'}, &(0x7f0000000940)}) waitid(0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x0, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f0000000200)='cpu.stat\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000080), &(0x7f0000000140)}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000240), 0x0) socketpair$inet(0x1e, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000ac0)={0x5, 0x10000, 0x279c}) connect$unix(r4, &(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e) [ 718.420492] bridge0: port 2(bridge_slave_1) entered disabled state [ 718.427474] bridge0: port 1(bridge_slave_0) entered disabled state [ 718.482294] device bridge0 left promiscuous mode [ 718.530106] bridge0: port 2(bridge_slave_1) entered blocking state [ 718.537132] bridge0: port 2(bridge_slave_1) entered forwarding state [ 718.545561] bridge0: port 1(bridge_slave_0) entered blocking state [ 718.552187] bridge0: port 1(bridge_slave_0) entered forwarding state [ 718.619658] device bridge0 entered promiscuous mode 03:34:52 executing program 5: socket$inet6(0xa, 0x3, 0x1a) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000009c0)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)) recvfrom(0xffffffffffffffff, &(0x7f0000000a00)=""/156, 0x9c, 0x40012000, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000004c0), 0x0, 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f00000007c0)={r2}, &(0x7f0000000800)=""/208, 0xd0, &(0x7f0000000100)={&(0x7f0000000900)={'crct10dif\x00'}, &(0x7f0000000940)}) waitid(0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x0, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f0000000200)='cpu.stat\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000080), &(0x7f0000000140)}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000240), 0x0) socketpair$inet(0x1e, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000ac0)={0x5, 0x10000, 0x279c}) connect$unix(r4, &(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e) [ 718.678123] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 03:34:52 executing program 2: r0 = socket$inet(0x2, 0xa, 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000080)=""/103, 0x67, 0x0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x811b000) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000, 0x7ff}, {}, @cond=[{0x8, 0x9, 0x0, 0x1, 0x0, 0x9}, {0xfffffffffffffffd}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000a40)={"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"}) syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x7fffffff) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00'}, 0x0, 0x200, 0x0, r5, 0x0, 0x1, "73797a30000000000000000000000000000000000000000000000000000000000000ecba0000000000000000000100", &(0x7f0000000180), 0x0, [], [0x80000001, 0x9, 0x8]}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000340)=""/62) socket$inet_dccp(0x2, 0x6, 0x0) 03:34:52 executing program 5: socket$inet6(0xa, 0x3, 0x1a) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000009c0)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)) recvfrom(0xffffffffffffffff, &(0x7f0000000a00)=""/156, 0x9c, 0x40012000, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000004c0), 0x0, 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f00000007c0)={r2}, &(0x7f0000000800)=""/208, 0xd0, &(0x7f0000000100)={&(0x7f0000000900)={'crct10dif\x00'}, &(0x7f0000000940)}) waitid(0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x0, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f0000000200)='cpu.stat\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000080), &(0x7f0000000140)}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000240), 0x0) socketpair$inet(0x1e, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000ac0)={0x5, 0x10000, 0x279c}) connect$unix(r4, &(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e) 03:34:52 executing program 4: socket$inet6(0xa, 0x3, 0x1a) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000009c0)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)) recvfrom(0xffffffffffffffff, &(0x7f0000000a00)=""/156, 0x9c, 0x40012000, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000004c0), 0x0, 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f00000007c0)={r2}, &(0x7f0000000800)=""/208, 0xd0, &(0x7f0000000100)={&(0x7f0000000900)={'crct10dif\x00'}, &(0x7f0000000940)}) waitid(0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x0, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f0000000200)='cpu.stat\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000080), &(0x7f0000000140)}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000240), 0x0) socketpair$inet(0x1e, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000ac0)={0x5, 0x10000, 0x279c}) connect$unix(r4, &(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e) [ 719.053942] bridge0: port 2(bridge_slave_1) entered disabled state [ 719.060745] bridge0: port 1(bridge_slave_0) entered disabled state 03:34:52 executing program 1: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@local, @in6}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000a00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000003640), &(0x7f0000003680)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000039c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003a40)={@local}, &(0x7f0000003a80)=0x14) accept4(0xffffffffffffffff, &(0x7f0000003ac0)=@hci, &(0x7f0000003b40)=0x80, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003bc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d40)={{{@in6, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000003e40)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005b40), 0x0, 0x0, &(0x7f0000005c40)={0x77359400}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005c80)={@empty, @dev}, &(0x7f0000005cc0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005d00), &(0x7f0000005d40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007740)={@multicast2, @remote}, &(0x7f0000007780)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007880)={@mcast2}, &(0x7f00000078c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000007900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007940)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000d000)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f000000d100)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000da00)={&(0x7f0000000780), 0xc, &(0x7f000000d9c0)={&(0x7f0000001800)=ANY=[]}}, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000540), 0x10) accept4$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)) pivot_root(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000740)={0x7}, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000300)={'team_slave_1\x00', {0x2, 0x0, @multicast2}}) clock_gettime(0x0, &(0x7f0000000140)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.type\x00', 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000640)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f00000006c0)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f0000000340)) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) creat(&(0x7f0000000500)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000540), 0x40001ce, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f00000000c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000280)=0xe8) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000140)=""/244) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000440)={@dev}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@broadcast, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000640)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) getresuid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getegid() fstat(0xffffffffffffffff, &(0x7f0000000940)) getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) getgid() syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") [ 719.138144] device bridge0 left promiscuous mode [ 719.172503] bridge0: port 2(bridge_slave_1) entered blocking state [ 719.178917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 719.185718] bridge0: port 1(bridge_slave_0) entered blocking state [ 719.192183] bridge0: port 1(bridge_slave_0) entered forwarding state 03:34:52 executing program 5: socket$inet6(0xa, 0x3, 0x1a) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000009c0)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)) recvfrom(0xffffffffffffffff, &(0x7f0000000a00)=""/156, 0x9c, 0x40012000, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000004c0), 0x0, 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f00000007c0)={r2}, &(0x7f0000000800)=""/208, 0xd0, &(0x7f0000000100)={&(0x7f0000000900)={'crct10dif\x00'}, &(0x7f0000000940)}) waitid(0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x0, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f0000000200)='cpu.stat\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000080), &(0x7f0000000140)}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000240), 0x0) socketpair$inet(0x1e, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000ac0)={0x5, 0x10000, 0x279c}) connect$unix(r4, &(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e) [ 719.347324] device bridge0 entered promiscuous mode [ 719.378958] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 03:34:52 executing program 4: socket$inet6(0xa, 0x3, 0x1a) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000009c0)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)) recvfrom(0xffffffffffffffff, &(0x7f0000000a00)=""/156, 0x9c, 0x40012000, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000004c0), 0x0, 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f00000007c0)={r2}, &(0x7f0000000800)=""/208, 0xd0, &(0x7f0000000100)={&(0x7f0000000900)={'crct10dif\x00'}, &(0x7f0000000940)}) waitid(0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x0, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f0000000200)='cpu.stat\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000080), &(0x7f0000000140)}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000240), 0x0) socketpair$inet(0x1e, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000ac0)={0x5, 0x10000, 0x279c}) connect$unix(r4, &(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e) 03:34:52 executing program 5: socket$inet6(0xa, 0x3, 0x1a) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000009c0)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)) recvfrom(0xffffffffffffffff, &(0x7f0000000a00)=""/156, 0x9c, 0x40012000, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000004c0), 0x0, 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f00000007c0)={r2}, &(0x7f0000000800)=""/208, 0xd0, &(0x7f0000000100)={&(0x7f0000000900)={'crct10dif\x00'}, &(0x7f0000000940)}) waitid(0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x0, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f0000000200)='cpu.stat\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000080), &(0x7f0000000140)}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000240), 0x0) socketpair$inet(0x1e, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000ac0)={0x5, 0x10000, 0x279c}) connect$unix(r4, &(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e) 03:34:52 executing program 2: r0 = socket$inet(0x2, 0xa, 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000080)=""/103, 0x67, 0x0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x811b000) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000, 0x7ff}, {}, @cond=[{0x8, 0x9, 0x0, 0x1, 0x0, 0x9}, {0xfffffffffffffffd}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000a40)={"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"}) syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x7fffffff) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00'}, 0x0, 0x200, 0x0, r5, 0x0, 0x1, "73797a30000000000000000000000000000000000000000000000000000000000000ecba0000000000000000000100", &(0x7f0000000180), 0x0, [], [0x80000001, 0x9, 0x8]}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000340)=""/62) socket$inet_dccp(0x2, 0x6, 0x0) 03:34:53 executing program 4: socket$inet6(0xa, 0x3, 0x1a) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000009c0)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)) recvfrom(0xffffffffffffffff, &(0x7f0000000a00)=""/156, 0x9c, 0x40012000, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000004c0), 0x0, 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f00000007c0)={r2}, &(0x7f0000000800)=""/208, 0xd0, &(0x7f0000000100)={&(0x7f0000000900)={'crct10dif\x00'}, &(0x7f0000000940)}) waitid(0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x0, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f0000000200)='cpu.stat\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000080), &(0x7f0000000140)}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000240), 0x0) socketpair$inet(0x1e, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000ac0)={0x5, 0x10000, 0x279c}) connect$unix(r4, &(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e) 03:34:53 executing program 5: socket$inet6(0xa, 0x3, 0x1a) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000009c0)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)) recvfrom(0xffffffffffffffff, &(0x7f0000000a00)=""/156, 0x9c, 0x40012000, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000004c0), 0x0, 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f00000007c0)={r2}, &(0x7f0000000800)=""/208, 0xd0, &(0x7f0000000100)={&(0x7f0000000900)={'crct10dif\x00'}, &(0x7f0000000940)}) waitid(0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x0, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f0000000200)='cpu.stat\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000080), &(0x7f0000000140)}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000240), 0x0) socketpair$inet(0x1e, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000ac0)={0x5, 0x10000, 0x279c}) connect$unix(r4, &(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e) [ 719.760897] bridge0: port 2(bridge_slave_1) entered disabled state [ 719.767620] bridge0: port 1(bridge_slave_0) entered disabled state [ 719.803845] device bridge0 left promiscuous mode [ 719.882614] bridge0: port 2(bridge_slave_1) entered blocking state [ 719.889454] bridge0: port 2(bridge_slave_1) entered forwarding state [ 719.896395] bridge0: port 1(bridge_slave_0) entered blocking state [ 719.903043] bridge0: port 1(bridge_slave_0) entered forwarding state [ 719.936356] device bridge0 entered promiscuous mode 03:34:53 executing program 4: socket$inet6(0xa, 0x3, 0x1a) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000009c0)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)) recvfrom(0xffffffffffffffff, &(0x7f0000000a00)=""/156, 0x9c, 0x40012000, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000004c0), 0x0, 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f00000007c0)={r2}, &(0x7f0000000800)=""/208, 0xd0, &(0x7f0000000100)={&(0x7f0000000900)={'crct10dif\x00'}, &(0x7f0000000940)}) waitid(0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x0, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f0000000200)='cpu.stat\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000080), &(0x7f0000000140)}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000240), 0x0) socketpair$inet(0x1e, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000ac0)={0x5, 0x10000, 0x279c}) connect$unix(r4, &(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e) 03:34:53 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000080)=""/103, 0x67, 0x0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x811b000) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000, 0x7ff}, {}, @cond=[{0x8, 0x9, 0x0, 0x1, 0x0, 0x9}, {0xfffffffffffffffd}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000a40)={"f540a8cd4e91a607f8791c3148f0117391bcc932b2b191ef916bae4f5e748f24566ab72744c062ae7acf724a90c4ea4b510901479f81161ccf4bf96f1704b3f4590888780ef047bd50b5039bb45768db48d4d6acfe3686b26352829d38de46597646de40c3a1509aa878d68ca90f9be18814389639d2940b6a8f564ca963aec46804b27f7e8c89a524768cecce07798752a544b972def6f6d6b878a7a2a3c5f318ee75b19c01b505a12ceb09684cfb3cab04d6c490ead2e1c90111fec70e88ec12345eb1f7a280db051b6b3128badf3af8bba53fc464547c25e882621e7a17b9e78281cf30f44799162c87c56a353d63569e09789eb69b3eca930bcac1714d73b729436b4b249fe9170b43d0ce7b80c6b09e90d83c7d84d0038bdf5b2090ab844699467e35562901eee2a48dcba7330120d0e7a22925bc4a03e7bc22882fdfc28463e555b2bfce1a676556f1f50457cd738e1023c987962521fb0f6d47e816387038a42b7f483e12c508719fc2a7a4fbdf70516134a91ea9ca30f65296268d5862b70b3cdde0658347500265ce4bf4725a662ca462381526d4ee9fc893444277a5719e8d779d8674c88132e727417ac7e6f9e94b8cf34dc0e4b46fbce2dba03fe76650375deece19bc2fb11bed59ec3b3922b2a34f3ea9bb206be7f84fbc2565a413c05f1973049c1da6f79133d917662f9eecb50703da56afd18b3c0fd7f774537d25a54ea61d7d16d6c6aaeea02ef252d033c72c574f53e03d1b39fbac0ef4b1a678936480e5cfd40ed55ea38ed3e0316957368d15dc7bba0eb89a9c2d0838a3282aa264465ade873c8fff23632942cd14bde969f6864436b460363f332d4d0e1b5c5fb46f8f8f9e3d2c585d585ca7f4396a57dc1038cf7d7458cf1452cbfa6597979521975898783c7b87168172de6264feaabdf3fc34ce41c01a6981404e7ae3df3b94a9f566dcd78a5420fc208a4c7c1e9dc3fd4feac74a1e6ac56d9bf10dc53aacecdc8df639ba4019cb7ebd29531ffd8909f2fa38a8137b5a7e9c1d5440eba13030d8e4cd31ad58b500c944780be8cc333d0f69db54954d9a34f8cd3054a44f89b7bc097c839adbf3890a13a3792941b58f2187e67f28d58db9778c4127b0822a69ad32556f4b6f44f3dbe606af57e63df8b8fc0ab75770f3d8bb48ba62b238872bd4aef2a841d422cfd9905fd6aca1c958008424719307517170d7e16b1180090e09e09e4f79852fb2c0f9deeb9ef498dc3940921a7d994ce809dca2413bb7a0ae051126b2210224774853ebcb4d3ac0badee15c80355f04b6f643f74247bab1698c0e64992533b51ec04fb3dd8b06a8c32bce1661ec45d23d373491c3f0a79de6021015f338eae11169697a615f276f560a8558272f0cd64058d720e05e5cda696e764288ab7849a6730f78bb6c90036845ffb8bcd176ebfa4240e9"}) syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x7fffffff) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00'}, 0x0, 0x200, 0x0, r5, 0x0, 0x1, "73797a30000000000000000000000000000000000000000000000000000000000000ecba0000000000000000000100", &(0x7f0000000180), 0x0, [], [0x80000001, 0x9, 0x8]}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000340)=""/62) socket$inet_dccp(0x2, 0x6, 0x0) [ 720.011924] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 03:34:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000300)={'team_slave_1\x00', {0x2, 0x0, @multicast2}}) clock_gettime(0x0, &(0x7f0000000140)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.type\x00', 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000640)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f00000006c0)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f0000000340)) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) creat(&(0x7f0000000500)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000540), 0x40001ce, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f00000000c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000280)=0xe8) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:53 executing program 4: socket$inet6(0xa, 0x3, 0x1a) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000009c0)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)) recvfrom(0xffffffffffffffff, &(0x7f0000000a00)=""/156, 0x9c, 0x40012000, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000004c0), 0x0, 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f00000007c0)={r2}, &(0x7f0000000800)=""/208, 0xd0, &(0x7f0000000100)={&(0x7f0000000900)={'crct10dif\x00'}, &(0x7f0000000940)}) waitid(0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x0, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f0000000200)='cpu.stat\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000080), &(0x7f0000000140)}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000240), 0x0) socketpair$inet(0x1e, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000ac0)={0x5, 0x10000, 0x279c}) connect$unix(r4, &(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e) 03:34:53 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000080)=""/103, 0x67, 0x0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x811b000) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000, 0x7ff}, {}, @cond=[{0x8, 0x9, 0x0, 0x1, 0x0, 0x9}, {0xfffffffffffffffd}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000a40)={"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"}) syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x7fffffff) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00'}, 0x0, 0x200, 0x0, r5, 0x0, 0x1, "73797a30000000000000000000000000000000000000000000000000000000000000ecba0000000000000000000100", &(0x7f0000000180), 0x0, [], [0x80000001, 0x9, 0x8]}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000340)=""/62) socket$inet_dccp(0x2, 0x6, 0x0) 03:34:53 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000080)=""/103, 0x67, 0x0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x811b000) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000, 0x7ff}, {}, @cond=[{0x8, 0x9, 0x0, 0x1, 0x0, 0x9}, {0xfffffffffffffffd}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000a40)={"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"}) syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x7fffffff) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00'}, 0x0, 0x200, 0x0, r5, 0x0, 0x1, "73797a30000000000000000000000000000000000000000000000000000000000000ecba0000000000000000000100", &(0x7f0000000180), 0x0, [], [0x80000001, 0x9, 0x8]}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000340)=""/62) socket$inet_dccp(0x2, 0x6, 0x0) [ 720.173597] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 720.288800] bridge0: port 2(bridge_slave_1) entered disabled state [ 720.295894] bridge0: port 1(bridge_slave_0) entered disabled state 03:34:53 executing program 4: socket$inet6(0xa, 0x3, 0x1a) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000009c0)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)) recvfrom(0xffffffffffffffff, &(0x7f0000000a00)=""/156, 0x9c, 0x40012000, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000004c0), 0x0, 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f00000007c0)={r2}, &(0x7f0000000800)=""/208, 0xd0, &(0x7f0000000100)={&(0x7f0000000900)={'crct10dif\x00'}, &(0x7f0000000940)}) waitid(0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000280)) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x0, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f0000000200)='cpu.stat\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000080), &(0x7f0000000140)}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000240), 0x0) socketpair$inet(0x1e, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000ac0)={0x5, 0x10000, 0x279c}) connect$unix(r4, &(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e) 03:34:53 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) close(r1) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000c85000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) poll(&(0x7f0000000140)=[{r2}], 0x1, 0x100000001) 03:34:54 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 03:34:54 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f00000006c0)=@acquire={0x128, 0x17, 0x401, 0x0, 0x0, {{@in=@multicast2}, @in, {@in6=@mcast1, @in6=@loopback}, {{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bbb}}}, 0xff2f}}, 0x0) 03:34:54 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f00000006c0)=@acquire={0x128, 0x17, 0x401, 0x0, 0x0, {{@in=@multicast2}, @in, {@in6=@mcast1, @in6=@loopback}, {{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bbb}}}, 0xff2f}}, 0x0) 03:34:54 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f00000006c0)=@acquire={0x128, 0x17, 0x401, 0x0, 0x0, {{@in=@multicast2}, @in, {@in6=@mcast1, @in6=@loopback}, {{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bbb}}}, 0xff2f}}, 0x0) 03:34:54 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f00000006c0)=@acquire={0x128, 0x17, 0x401, 0x0, 0x0, {{@in=@multicast2}, @in, {@in6=@mcast1, @in6=@loopback}, {{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bbb}}}, 0xff2f}}, 0x0) [ 721.332482] bridge0: port 2(bridge_slave_1) entered disabled state [ 721.339134] bridge0: port 1(bridge_slave_0) entered disabled state [ 721.538236] bridge0: port 2(bridge_slave_1) entered blocking state [ 721.544743] bridge0: port 2(bridge_slave_1) entered forwarding state [ 721.551438] bridge0: port 1(bridge_slave_0) entered blocking state [ 721.557880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 721.564691] device bridge0 entered promiscuous mode [ 721.572565] bridge0: port 2(bridge_slave_1) entered blocking state [ 721.578961] bridge0: port 2(bridge_slave_1) entered forwarding state 03:34:54 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000080)=""/103, 0x67, 0x0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x811b000) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000, 0x7ff}, {}, @cond=[{0x8, 0x9, 0x0, 0x1, 0x0, 0x9}, {0xfffffffffffffffd}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000a40)={"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"}) syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x7fffffff) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00'}, 0x0, 0x200, 0x0, r5, 0x0, 0x1, "73797a30000000000000000000000000000000000000000000000000000000000000ecba0000000000000000000100", &(0x7f0000000180), 0x0, [], [0x80000001, 0x9, 0x8]}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000340)=""/62) socket$inet_dccp(0x2, 0x6, 0x0) 03:34:54 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r1, 0x0) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x6) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) [ 721.585718] bridge0: port 1(bridge_slave_0) entered blocking state [ 721.592182] bridge0: port 1(bridge_slave_0) entered forwarding state [ 721.616402] device bridge0 entered promiscuous mode 03:34:54 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000080)=""/103, 0x67, 0x0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x811b000) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000, 0x7ff}, {}, @cond=[{0x8, 0x9, 0x0, 0x1, 0x0, 0x9}, {0xfffffffffffffffd}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000a40)={"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"}) syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x7fffffff) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00'}, 0x0, 0x200, 0x0, r5, 0x0, 0x1, "73797a30000000000000000000000000000000000000000000000000000000000000ecba0000000000000000000100", &(0x7f0000000180), 0x0, [], [0x80000001, 0x9, 0x8]}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000340)=""/62) socket$inet_dccp(0x2, 0x6, 0x0) [ 721.657908] bridge0: port 2(bridge_slave_1) entered disabled state [ 721.664819] bridge0: port 1(bridge_slave_0) entered disabled state [ 722.022931] bridge0: port 2(bridge_slave_1) entered blocking state [ 722.029561] bridge0: port 2(bridge_slave_1) entered forwarding state [ 722.036377] bridge0: port 1(bridge_slave_0) entered blocking state [ 722.042802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 722.051074] device bridge0 entered promiscuous mode 03:34:55 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) close(r1) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000c85000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) poll(&(0x7f0000000140)=[{r2}], 0x1, 0x100000001) [ 722.077716] bridge0: port 2(bridge_slave_1) entered disabled state [ 722.084452] bridge0: port 1(bridge_slave_0) entered disabled state [ 722.116043] device bridge0 left promiscuous mode 03:34:55 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000080)=""/103, 0x67, 0x0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x811b000) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000, 0x7ff}, {}, @cond=[{0x8, 0x9, 0x0, 0x1, 0x0, 0x9}, {0xfffffffffffffffd}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000a40)={"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"}) syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x7fffffff) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00'}, 0x0, 0x200, 0x0, r5, 0x0, 0x1, "73797a30000000000000000000000000000000000000000000000000000000000000ecba0000000000000000000100", &(0x7f0000000180), 0x0, [], [0x80000001, 0x9, 0x8]}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000340)=""/62) socket$inet_dccp(0x2, 0x6, 0x0) 03:34:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 03:34:55 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r1, 0x0) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x6) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) [ 722.770812] bridge0: port 2(bridge_slave_1) entered disabled state [ 722.777354] bridge0: port 1(bridge_slave_0) entered disabled state [ 722.784430] device bridge0 left promiscuous mode [ 723.024737] bridge0: port 2(bridge_slave_1) entered blocking state [ 723.031238] bridge0: port 2(bridge_slave_1) entered forwarding state [ 723.038043] bridge0: port 1(bridge_slave_0) entered blocking state [ 723.044495] bridge0: port 1(bridge_slave_0) entered forwarding state [ 723.051298] device bridge0 entered promiscuous mode [ 723.058320] bridge0: port 2(bridge_slave_1) entered blocking state [ 723.064855] bridge0: port 2(bridge_slave_1) entered forwarding state 03:34:56 executing program 5: r0 = socket$inet(0x2, 0xa, 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000080)=""/103, 0x67, 0x0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x811b000) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000, 0x7ff}, {}, @cond=[{0x8, 0x9, 0x0, 0x1, 0x0, 0x9}, {0xfffffffffffffffd}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000a40)={"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"}) syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x7fffffff) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00'}, 0x0, 0x200, 0x0, r5, 0x0, 0x1, "73797a30000000000000000000000000000000000000000000000000000000000000ecba0000000000000000000100", &(0x7f0000000180), 0x0, [], [0x80000001, 0x9, 0x8]}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000340)=""/62) socket$inet_dccp(0x2, 0x6, 0x0) [ 723.071532] bridge0: port 1(bridge_slave_0) entered blocking state [ 723.077931] bridge0: port 1(bridge_slave_0) entered forwarding state [ 723.085287] device bridge0 entered promiscuous mode 03:34:56 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r1, 0x0) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x6) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) 03:34:56 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) close(r1) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000c85000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) poll(&(0x7f0000000140)=[{r2}], 0x1, 0x100000001) 03:34:56 executing program 1: r0 = socket$inet(0x2, 0xa, 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000080)=""/103, 0x67, 0x0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x811b000) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000, 0x7ff}, {}, @cond=[{0x8, 0x9, 0x0, 0x1, 0x0, 0x9}, {0xfffffffffffffffd}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000a40)={"f540a8cd4e91a607f8791c3148f0117391bcc932b2b191ef916bae4f5e748f24566ab72744c062ae7acf724a90c4ea4b510901479f81161ccf4bf96f1704b3f4590888780ef047bd50b5039bb45768db48d4d6acfe3686b26352829d38de46597646de40c3a1509aa878d68ca90f9be18814389639d2940b6a8f564ca963aec46804b27f7e8c89a524768cecce07798752a544b972def6f6d6b878a7a2a3c5f318ee75b19c01b505a12ceb09684cfb3cab04d6c490ead2e1c90111fec70e88ec12345eb1f7a280db051b6b3128badf3af8bba53fc464547c25e882621e7a17b9e78281cf30f44799162c87c56a353d63569e09789eb69b3eca930bcac1714d73b729436b4b249fe9170b43d0ce7b80c6b09e90d83c7d84d0038bdf5b2090ab844699467e35562901eee2a48dcba7330120d0e7a22925bc4a03e7bc22882fdfc28463e555b2bfce1a676556f1f50457cd738e1023c987962521fb0f6d47e816387038a42b7f483e12c508719fc2a7a4fbdf70516134a91ea9ca30f65296268d5862b70b3cdde0658347500265ce4bf4725a662ca462381526d4ee9fc893444277a5719e8d779d8674c88132e727417ac7e6f9e94b8cf34dc0e4b46fbce2dba03fe76650375deece19bc2fb11bed59ec3b3922b2a34f3ea9bb206be7f84fbc2565a413c05f1973049c1da6f79133d917662f9eecb50703da56afd18b3c0fd7f774537d25a54ea61d7d16d6c6aaeea02ef252d033c72c574f53e03d1b39fbac0ef4b1a678936480e5cfd40ed55ea38ed3e0316957368d15dc7bba0eb89a9c2d0838a3282aa264465ade873c8fff23632942cd14bde969f6864436b460363f332d4d0e1b5c5fb46f8f8f9e3d2c585d585ca7f4396a57dc1038cf7d7458cf1452cbfa6597979521975898783c7b87168172de6264feaabdf3fc34ce41c01a6981404e7ae3df3b94a9f566dcd78a5420fc208a4c7c1e9dc3fd4feac74a1e6ac56d9bf10dc53aacecdc8df639ba4019cb7ebd29531ffd8909f2fa38a8137b5a7e9c1d5440eba13030d8e4cd31ad58b500c944780be8cc333d0f69db54954d9a34f8cd3054a44f89b7bc097c839adbf3890a13a3792941b58f2187e67f28d58db9778c4127b0822a69ad32556f4b6f44f3dbe606af57e63df8b8fc0ab75770f3d8bb48ba62b238872bd4aef2a841d422cfd9905fd6aca1c958008424719307517170d7e16b1180090e09e09e4f79852fb2c0f9deeb9ef498dc3940921a7d994ce809dca2413bb7a0ae051126b2210224774853ebcb4d3ac0badee15c80355f04b6f643f74247bab1698c0e64992533b51ec04fb3dd8b06a8c32bce1661ec45d23d373491c3f0a79de6021015f338eae11169697a615f276f560a8558272f0cd64058d720e05e5cda696e764288ab7849a6730f78bb6c90036845ffb8bcd176ebfa4240e9"}) syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x7fffffff) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00'}, 0x0, 0x200, 0x0, r5, 0x0, 0x1, "73797a30000000000000000000000000000000000000000000000000000000000000ecba0000000000000000000100", &(0x7f0000000180), 0x0, [], [0x80000001, 0x9, 0x8]}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000340)=""/62) socket$inet_dccp(0x2, 0x6, 0x0) 03:34:56 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) [ 723.116059] bridge0: port 2(bridge_slave_1) entered disabled state [ 723.122750] bridge0: port 1(bridge_slave_0) entered disabled state [ 723.142726] device bridge0 left promiscuous mode [ 723.601675] bridge0: port 2(bridge_slave_1) entered blocking state [ 723.608125] bridge0: port 2(bridge_slave_1) entered forwarding state [ 723.614913] bridge0: port 1(bridge_slave_0) entered blocking state [ 723.621306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 723.628464] device bridge0 entered promiscuous mode [ 723.637279] bridge0: port 2(bridge_slave_1) entered disabled state [ 723.644014] bridge0: port 1(bridge_slave_0) entered disabled state 03:34:56 executing program 3: r0 = socket$inet(0x2, 0xa, 0x8) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000080)=""/103, 0x67, 0x0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x811b000) ioctl$sock_SIOCGIFINDEX(r0, 0x8907, &(0x7f0000000600)={'team_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sequencer\x00', 0x80, 0x0) getpeername(r0, &(0x7f0000000640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000006c0)=0x80) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x3, &(0x7f00000003c0)={0x0, 0xffffffffffffffcd}, &(0x7f0000000400)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000440)={0x57, 0x31, 0x400, {0x100000000, 0x7ff}, {}, @cond=[{0x8, 0x9, 0x0, 0x1, 0x0, 0x9}, {0xfffffffffffffffd}]}) ioctl$UI_SET_LEDBIT(0xffffffffffffff9c, 0x40045569, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000a40)={"f540a8cd4e91a607f8791c3148f0117391bcc932b2b191ef916bae4f5e748f24566ab72744c062ae7acf724a90c4ea4b510901479f81161ccf4bf96f1704b3f4590888780ef047bd50b5039bb45768db48d4d6acfe3686b26352829d38de46597646de40c3a1509aa878d68ca90f9be18814389639d2940b6a8f564ca963aec46804b27f7e8c89a524768cecce07798752a544b972def6f6d6b878a7a2a3c5f318ee75b19c01b505a12ceb09684cfb3cab04d6c490ead2e1c90111fec70e88ec12345eb1f7a280db051b6b3128badf3af8bba53fc464547c25e882621e7a17b9e78281cf30f44799162c87c56a353d63569e09789eb69b3eca930bcac1714d73b729436b4b249fe9170b43d0ce7b80c6b09e90d83c7d84d0038bdf5b2090ab844699467e35562901eee2a48dcba7330120d0e7a22925bc4a03e7bc22882fdfc28463e555b2bfce1a676556f1f50457cd738e1023c987962521fb0f6d47e816387038a42b7f483e12c508719fc2a7a4fbdf70516134a91ea9ca30f65296268d5862b70b3cdde0658347500265ce4bf4725a662ca462381526d4ee9fc893444277a5719e8d779d8674c88132e727417ac7e6f9e94b8cf34dc0e4b46fbce2dba03fe76650375deece19bc2fb11bed59ec3b3922b2a34f3ea9bb206be7f84fbc2565a413c05f1973049c1da6f79133d917662f9eecb50703da56afd18b3c0fd7f774537d25a54ea61d7d16d6c6aaeea02ef252d033c72c574f53e03d1b39fbac0ef4b1a678936480e5cfd40ed55ea38ed3e0316957368d15dc7bba0eb89a9c2d0838a3282aa264465ade873c8fff23632942cd14bde969f6864436b460363f332d4d0e1b5c5fb46f8f8f9e3d2c585d585ca7f4396a57dc1038cf7d7458cf1452cbfa6597979521975898783c7b87168172de6264feaabdf3fc34ce41c01a6981404e7ae3df3b94a9f566dcd78a5420fc208a4c7c1e9dc3fd4feac74a1e6ac56d9bf10dc53aacecdc8df639ba4019cb7ebd29531ffd8909f2fa38a8137b5a7e9c1d5440eba13030d8e4cd31ad58b500c944780be8cc333d0f69db54954d9a34f8cd3054a44f89b7bc097c839adbf3890a13a3792941b58f2187e67f28d58db9778c4127b0822a69ad32556f4b6f44f3dbe606af57e63df8b8fc0ab75770f3d8bb48ba62b238872bd4aef2a841d422cfd9905fd6aca1c958008424719307517170d7e16b1180090e09e09e4f79852fb2c0f9deeb9ef498dc3940921a7d994ce809dca2413bb7a0ae051126b2210224774853ebcb4d3ac0badee15c80355f04b6f643f74247bab1698c0e64992533b51ec04fb3dd8b06a8c32bce1661ec45d23d373491c3f0a79de6021015f338eae11169697a615f276f560a8558272f0cd64058d720e05e5cda696e764288ab7849a6730f78bb6c90036845ffb8bcd176ebfa4240e9"}) syz_open_dev$usbmon(&(0x7f0000000480)='/dev/usbmon#\x00', 0x20e, 0x80000) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x7fffffff) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r4, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x0, 0x100000000, 0x1, 'syz0\x00'}, 0x0, 0x200, 0x0, r5, 0x0, 0x1, "73797a30000000000000000000000000000000000000000000000000000000000000ecba0000000000000000000100", &(0x7f0000000180), 0x0, [], [0x80000001, 0x9, 0x8]}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000340)=""/62) socket$inet_dccp(0x2, 0x6, 0x0) [ 723.652766] device bridge0 left promiscuous mode 03:34:57 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) close(r1) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000c85000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) poll(&(0x7f0000000140)=[{r2}], 0x1, 0x100000001) 03:34:57 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r1, 0x0) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x6) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) [ 724.122261] bridge0: port 2(bridge_slave_1) entered blocking state [ 724.128705] bridge0: port 2(bridge_slave_1) entered forwarding state [ 724.135498] bridge0: port 1(bridge_slave_0) entered blocking state [ 724.141855] bridge0: port 1(bridge_slave_0) entered forwarding state [ 724.152683] device bridge0 entered promiscuous mode 03:34:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 03:34:57 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r1, 0x0) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x6) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) [ 724.172439] bridge0: port 2(bridge_slave_1) entered disabled state [ 724.179008] bridge0: port 1(bridge_slave_0) entered disabled state [ 724.211179] device bridge0 left promiscuous mode [ 724.503285] bridge0: port 2(bridge_slave_1) entered blocking state [ 724.509665] bridge0: port 2(bridge_slave_1) entered forwarding state [ 724.516384] bridge0: port 1(bridge_slave_0) entered blocking state [ 724.522767] bridge0: port 1(bridge_slave_0) entered forwarding state [ 724.529548] device bridge0 entered promiscuous mode [ 724.539540] bridge0: port 2(bridge_slave_1) entered disabled state [ 724.546195] bridge0: port 1(bridge_slave_0) entered disabled state 03:34:57 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r1, 0x0) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x6) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) 03:34:57 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) [ 724.553752] device bridge0 left promiscuous mode [ 724.828245] bridge0: port 2(bridge_slave_1) entered blocking state [ 724.834814] bridge0: port 2(bridge_slave_1) entered forwarding state [ 724.841496] bridge0: port 1(bridge_slave_0) entered blocking state [ 724.847940] bridge0: port 1(bridge_slave_0) entered forwarding state [ 724.855257] device bridge0 entered promiscuous mode 03:34:58 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) close(r1) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000c85000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) poll(&(0x7f0000000140)=[{r2}], 0x1, 0x100000001) 03:34:58 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 03:34:58 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r1, 0x0) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x6) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) 03:34:58 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r1, 0x0) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x6) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) 03:34:58 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) close(r1) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000c85000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) poll(&(0x7f0000000140)=[{r2}], 0x1, 0x100000001) 03:34:58 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = memfd_create(&(0x7f0000000080)="6d81351e39cfc228a4c67200", 0x0) fallocate(r1, 0x0, 0x0, 0x6) lseek(r1, 0x0, 0x4) 03:34:58 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) close(r1) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000c85000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) poll(&(0x7f0000000140)=[{r2}], 0x1, 0x100000001) 03:34:58 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) close(r1) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000c85000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) poll(&(0x7f0000000140)=[{r2}], 0x1, 0x100000001) 03:34:58 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 03:34:58 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = memfd_create(&(0x7f0000000080)="6d81351e39cfc228a4c67200", 0x0) fallocate(r1, 0x0, 0x0, 0x6) lseek(r1, 0x0, 0x4) 03:34:58 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r1, 0x0) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x6) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) 03:34:58 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r1, 0x0) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x6) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) 03:34:58 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = memfd_create(&(0x7f0000000080)="6d81351e39cfc228a4c67200", 0x0) fallocate(r1, 0x0, 0x0, 0x6) lseek(r1, 0x0, 0x4) 03:34:58 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) close(r1) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000c85000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) poll(&(0x7f0000000140)=[{r2}], 0x1, 0x100000001) 03:34:58 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) close(r1) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000c85000)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) poll(&(0x7f0000000140)=[{r2}], 0x1, 0x100000001) 03:34:58 executing program 2: io_setup(0x2, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='-/keyringvboxnet0+trusted\x00'}, 0x10) getgroups(0x0, &(0x7f00000002c0)) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:34:58 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = memfd_create(&(0x7f0000000080)="6d81351e39cfc228a4c67200", 0x0) fallocate(r1, 0x0, 0x0, 0x6) lseek(r1, 0x0, 0x4) 03:34:58 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f00000003c0)) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f00000000c0)={0xf}, 0xf) link(&(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='./file0\x00') fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0xfffffffffffffd38, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000140)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@local, @multicast2}, &(0x7f0000000580)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000600)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in=@local, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@remote}}, 0xe8) creat(&(0x7f00000002c0)='./file0\x00', 0x0) creat(&(0x7f0000000540)='./file0\x00', 0x0) getpgid(0x0) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000480)) ptrace$peekuser(0x3, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500), 0x8) creat(&(0x7f0000000640)='./file1/file0\x00', 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000680), 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000100)}) 03:34:58 executing program 1: clock_settime(0xffffffff88ca6d23, &(0x7f0000000040)={0x77359400}) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000002840)) recvfrom(0xffffffffffffffff, &(0x7f0000000500)=""/143, 0x8f, 0x0, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000002940)='./file0\x00', 0x0) syz_open_dev$loop(&(0x7f0000002880)='/dev/loop#\x00', 0x0, 0x0) accept(0xffffffffffffff9c, 0x0, &(0x7f00000028c0)=0xfffffffffffffd68) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:34:58 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r2, r2, 0x0) r3 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r4, 0x5452, &(0x7f00005ebff8)=0x3f) fcntl$setownex(r4, 0xf, &(0x7f0000704000)={0x0, r3}) recvmsg(r5, &(0x7f000095cfc8)={&(0x7f0000893ff8)=@sco, 0x8, &(0x7f00000a4fb0), 0x0, &(0x7f0000b30000)}, 0x0) r6 = dup2(r4, r5) write$eventfd(r6, &(0x7f0000000040), 0x8) 03:34:58 executing program 5: timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000200)) timer_getoverrun(0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000640), 0x10) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x77359400}}, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@dev, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000840)=0xe8) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000680)={'nat\x00'}, &(0x7f0000000700)=0x78) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000340)) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000640)=ANY=[], 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000001c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000600)) getresuid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) socket$nl_netfilter(0x10, 0x3, 0xc) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000300)}) semget(0xffffffffffffffff, 0x0, 0x0) semop(0x0, &(0x7f00000004c0), 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) link(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='./file0\x00') msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000580)={0x2, 0x0, @rand_addr}, &(0x7f00000005c0)=0x10) clock_gettime(0x0, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:58 executing program 0: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000740)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000005f80)={0x0, 0x1c9c380}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:59 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r2, r2, 0x0) r3 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r4, 0x5452, &(0x7f00005ebff8)=0x3f) fcntl$setownex(r4, 0xf, &(0x7f0000704000)={0x0, r3}) recvmsg(r5, &(0x7f000095cfc8)={&(0x7f0000893ff8)=@sco, 0x8, &(0x7f00000a4fb0), 0x0, &(0x7f0000b30000)}, 0x0) r6 = dup2(r4, r5) write$eventfd(r6, &(0x7f0000000040), 0x8) 03:34:59 executing program 0: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000740)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000005f80)={0x0, 0x1c9c380}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:59 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r2, r2, 0x0) r3 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r4, 0x5452, &(0x7f00005ebff8)=0x3f) fcntl$setownex(r4, 0xf, &(0x7f0000704000)={0x0, r3}) recvmsg(r5, &(0x7f000095cfc8)={&(0x7f0000893ff8)=@sco, 0x8, &(0x7f00000a4fb0), 0x0, &(0x7f0000b30000)}, 0x0) r6 = dup2(r4, r5) write$eventfd(r6, &(0x7f0000000040), 0x8) 03:34:59 executing program 0: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000740)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000005f80)={0x0, 0x1c9c380}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:59 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r2, r2, 0x0) r3 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r4, 0x5452, &(0x7f00005ebff8)=0x3f) fcntl$setownex(r4, 0xf, &(0x7f0000704000)={0x0, r3}) recvmsg(r5, &(0x7f000095cfc8)={&(0x7f0000893ff8)=@sco, 0x8, &(0x7f00000a4fb0), 0x0, &(0x7f0000b30000)}, 0x0) r6 = dup2(r4, r5) write$eventfd(r6, &(0x7f0000000040), 0x8) 03:34:59 executing program 2: io_setup(0x2, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='-/keyringvboxnet0+trusted\x00'}, 0x10) getgroups(0x0, &(0x7f00000002c0)) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:34:59 executing program 0: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000740)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000005f80)={0x0, 0x1c9c380}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:00 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f00000003c0)) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f00000000c0)={0xf}, 0xf) link(&(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='./file0\x00') fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0xfffffffffffffd38, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000140)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@local, @multicast2}, &(0x7f0000000580)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000600)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in=@local, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@remote}}, 0xe8) creat(&(0x7f00000002c0)='./file0\x00', 0x0) creat(&(0x7f0000000540)='./file0\x00', 0x0) getpgid(0x0) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000480)) ptrace$peekuser(0x3, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500), 0x8) creat(&(0x7f0000000640)='./file1/file0\x00', 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000680), 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000100)}) 03:35:00 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r2, r2, 0x0) r3 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r4, 0x5452, &(0x7f00005ebff8)=0x3f) fcntl$setownex(r4, 0xf, &(0x7f0000704000)={0x0, r3}) recvmsg(r5, &(0x7f000095cfc8)={&(0x7f0000893ff8)=@sco, 0x8, &(0x7f00000a4fb0), 0x0, &(0x7f0000b30000)}, 0x0) r6 = dup2(r4, r5) write$eventfd(r6, &(0x7f0000000040), 0x8) 03:35:00 executing program 5: timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000200)) timer_getoverrun(0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000640), 0x10) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x77359400}}, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@dev, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000840)=0xe8) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000680)={'nat\x00'}, &(0x7f0000000700)=0x78) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000340)) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000640)=ANY=[], 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000001c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000600)) getresuid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) socket$nl_netfilter(0x10, 0x3, 0xc) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000300)}) semget(0xffffffffffffffff, 0x0, 0x0) semop(0x0, &(0x7f00000004c0), 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) link(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='./file0\x00') msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000580)={0x2, 0x0, @rand_addr}, &(0x7f00000005c0)=0x10) clock_gettime(0x0, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:00 executing program 1: clock_settime(0xffffffff88ca6d23, &(0x7f0000000040)={0x77359400}) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000002840)) recvfrom(0xffffffffffffffff, &(0x7f0000000500)=""/143, 0x8f, 0x0, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000002940)='./file0\x00', 0x0) syz_open_dev$loop(&(0x7f0000002880)='/dev/loop#\x00', 0x0, 0x0) accept(0xffffffffffffff9c, 0x0, &(0x7f00000028c0)=0xfffffffffffffd68) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:35:00 executing program 0: timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000200)) timer_getoverrun(0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000640), 0x10) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x77359400}}, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@dev, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000840)=0xe8) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000680)={'nat\x00'}, &(0x7f0000000700)=0x78) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000340)) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000640)=ANY=[], 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000001c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000600)) getresuid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) socket$nl_netfilter(0x10, 0x3, 0xc) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000300)}) semget(0xffffffffffffffff, 0x0, 0x0) semop(0x0, &(0x7f00000004c0), 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) link(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='./file0\x00') msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000580)={0x2, 0x0, @rand_addr}, &(0x7f00000005c0)=0x10) clock_gettime(0x0, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:00 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r2, r2, 0x0) r3 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r4, 0x5452, &(0x7f00005ebff8)=0x3f) fcntl$setownex(r4, 0xf, &(0x7f0000704000)={0x0, r3}) recvmsg(r5, &(0x7f000095cfc8)={&(0x7f0000893ff8)=@sco, 0x8, &(0x7f00000a4fb0), 0x0, &(0x7f0000b30000)}, 0x0) r6 = dup2(r4, r5) write$eventfd(r6, &(0x7f0000000040), 0x8) 03:35:00 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r2, r2, 0x0) r3 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r4, 0x5452, &(0x7f00005ebff8)=0x3f) fcntl$setownex(r4, 0xf, &(0x7f0000704000)={0x0, r3}) recvmsg(r5, &(0x7f000095cfc8)={&(0x7f0000893ff8)=@sco, 0x8, &(0x7f00000a4fb0), 0x0, &(0x7f0000b30000)}, 0x0) r6 = dup2(r4, r5) write$eventfd(r6, &(0x7f0000000040), 0x8) 03:35:00 executing program 2: io_setup(0x2, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='-/keyringvboxnet0+trusted\x00'}, 0x10) getgroups(0x0, &(0x7f00000002c0)) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:35:00 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r2, r2, 0x0) r3 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r4, 0x5452, &(0x7f00005ebff8)=0x3f) fcntl$setownex(r4, 0xf, &(0x7f0000704000)={0x0, r3}) recvmsg(r5, &(0x7f000095cfc8)={&(0x7f0000893ff8)=@sco, 0x8, &(0x7f00000a4fb0), 0x0, &(0x7f0000b30000)}, 0x0) r6 = dup2(r4, r5) write$eventfd(r6, &(0x7f0000000040), 0x8) 03:35:00 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r2, r2, 0x0) r3 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r4, 0x5452, &(0x7f00005ebff8)=0x3f) fcntl$setownex(r4, 0xf, &(0x7f0000704000)={0x0, r3}) recvmsg(r5, &(0x7f000095cfc8)={&(0x7f0000893ff8)=@sco, 0x8, &(0x7f00000a4fb0), 0x0, &(0x7f0000b30000)}, 0x0) r6 = dup2(r4, r5) write$eventfd(r6, &(0x7f0000000040), 0x8) 03:35:01 executing program 5: timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000200)) timer_getoverrun(0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000640), 0x10) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x77359400}}, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@dev, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000840)=0xe8) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000680)={'nat\x00'}, &(0x7f0000000700)=0x78) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000340)) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000640)=ANY=[], 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000001c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000600)) getresuid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) socket$nl_netfilter(0x10, 0x3, 0xc) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000300)}) semget(0xffffffffffffffff, 0x0, 0x0) semop(0x0, &(0x7f00000004c0), 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) link(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='./file0\x00') msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000580)={0x2, 0x0, @rand_addr}, &(0x7f00000005c0)=0x10) clock_gettime(0x0, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:01 executing program 1: clock_settime(0xffffffff88ca6d23, &(0x7f0000000040)={0x77359400}) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000002840)) recvfrom(0xffffffffffffffff, &(0x7f0000000500)=""/143, 0x8f, 0x0, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000002940)='./file0\x00', 0x0) syz_open_dev$loop(&(0x7f0000002880)='/dev/loop#\x00', 0x0, 0x0) accept(0xffffffffffffff9c, 0x0, &(0x7f00000028c0)=0xfffffffffffffd68) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:35:01 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f00000003c0)) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f00000000c0)={0xf}, 0xf) link(&(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='./file0\x00') fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0xfffffffffffffd38, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000140)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@local, @multicast2}, &(0x7f0000000580)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000600)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in=@local, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@remote}}, 0xe8) creat(&(0x7f00000002c0)='./file0\x00', 0x0) creat(&(0x7f0000000540)='./file0\x00', 0x0) getpgid(0x0) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000480)) ptrace$peekuser(0x3, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500), 0x8) creat(&(0x7f0000000640)='./file1/file0\x00', 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000680), 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000100)}) 03:35:01 executing program 0: timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000200)) timer_getoverrun(0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000640), 0x10) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x77359400}}, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@dev, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000840)=0xe8) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000680)={'nat\x00'}, &(0x7f0000000700)=0x78) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000340)) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000640)=ANY=[], 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000001c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000600)) getresuid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) socket$nl_netfilter(0x10, 0x3, 0xc) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000300)}) semget(0xffffffffffffffff, 0x0, 0x0) semop(0x0, &(0x7f00000004c0), 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) link(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='./file0\x00') msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000580)={0x2, 0x0, @rand_addr}, &(0x7f00000005c0)=0x10) clock_gettime(0x0, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:01 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r2, r2, 0x0) r3 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r4, 0x5452, &(0x7f00005ebff8)=0x3f) fcntl$setownex(r4, 0xf, &(0x7f0000704000)={0x0, r3}) recvmsg(r5, &(0x7f000095cfc8)={&(0x7f0000893ff8)=@sco, 0x8, &(0x7f00000a4fb0), 0x0, &(0x7f0000b30000)}, 0x0) r6 = dup2(r4, r5) write$eventfd(r6, &(0x7f0000000040), 0x8) 03:35:01 executing program 4: semctl$IPC_RMID(0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000040)) semget(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@remote, @in=@local}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000200)) geteuid() seccomp(0x0, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000ac0)) socket$key(0xf, 0x3, 0x2) shutdown(0xffffffffffffffff, 0x0) gettid() capget(&(0x7f0000000080), &(0x7f0000000140)) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211aaaa50f486c360d410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") epoll_wait(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getgid() stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000580)) getegid() getgid() syz_execute_func(&(0x7f0000000140)="428055a0726969ef69dc00d99069203737c3397c2a0626a540a52ef34298c4215971e400e5e5c4a2a10f9344613232231569c8212e1a1a3ef0f6585501c4e1edd1f631a3b786e298edc4227992749f55") 03:35:01 executing program 4: semctl$IPC_RMID(0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000040)) semget(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@remote, @in=@local}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000200)) geteuid() seccomp(0x0, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000ac0)) socket$key(0xf, 0x3, 0x2) shutdown(0xffffffffffffffff, 0x0) gettid() capget(&(0x7f0000000080), &(0x7f0000000140)) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211aaaa50f486c360d410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") epoll_wait(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getgid() stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000580)) getegid() getgid() syz_execute_func(&(0x7f0000000140)="428055a0726969ef69dc00d99069203737c3397c2a0626a540a52ef34298c4215971e400e5e5c4a2a10f9344613232231569c8212e1a1a3ef0f6585501c4e1edd1f631a3b786e298edc4227992749f55") 03:35:01 executing program 2: io_setup(0x2, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='-/keyringvboxnet0+trusted\x00'}, 0x10) getgroups(0x0, &(0x7f00000002c0)) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:35:01 executing program 4: semctl$IPC_RMID(0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000040)) semget(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@remote, @in=@local}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000200)) geteuid() seccomp(0x0, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000ac0)) socket$key(0xf, 0x3, 0x2) shutdown(0xffffffffffffffff, 0x0) gettid() capget(&(0x7f0000000080), &(0x7f0000000140)) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211aaaa50f486c360d410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") epoll_wait(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getgid() stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000580)) getegid() getgid() syz_execute_func(&(0x7f0000000140)="428055a0726969ef69dc00d99069203737c3397c2a0626a540a52ef34298c4215971e400e5e5c4a2a10f9344613232231569c8212e1a1a3ef0f6585501c4e1edd1f631a3b786e298edc4227992749f55") 03:35:01 executing program 5: timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000200)) timer_getoverrun(0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000640), 0x10) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x77359400}}, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@dev, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000840)=0xe8) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000680)={'nat\x00'}, &(0x7f0000000700)=0x78) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000340)) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000640)=ANY=[], 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000001c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000600)) getresuid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) socket$nl_netfilter(0x10, 0x3, 0xc) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000300)}) semget(0xffffffffffffffff, 0x0, 0x0) semop(0x0, &(0x7f00000004c0), 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) link(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='./file0\x00') msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000580)={0x2, 0x0, @rand_addr}, &(0x7f00000005c0)=0x10) clock_gettime(0x0, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:02 executing program 1: clock_settime(0xffffffff88ca6d23, &(0x7f0000000040)={0x77359400}) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000002840)) recvfrom(0xffffffffffffffff, &(0x7f0000000500)=""/143, 0x8f, 0x0, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000002940)='./file0\x00', 0x0) syz_open_dev$loop(&(0x7f0000002880)='/dev/loop#\x00', 0x0, 0x0) accept(0xffffffffffffff9c, 0x0, &(0x7f00000028c0)=0xfffffffffffffd68) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:35:02 executing program 0: timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000200)) timer_getoverrun(0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000640), 0x10) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x77359400}}, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@dev, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000840)=0xe8) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000680)={'nat\x00'}, &(0x7f0000000700)=0x78) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000340)) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000640)=ANY=[], 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000001c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000600)) getresuid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) socket$nl_netfilter(0x10, 0x3, 0xc) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000300)}) semget(0xffffffffffffffff, 0x0, 0x0) semop(0x0, &(0x7f00000004c0), 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) link(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='./file0\x00') msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000580)={0x2, 0x0, @rand_addr}, &(0x7f00000005c0)=0x10) clock_gettime(0x0, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:02 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f00000003c0)) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f00000000c0)={0xf}, 0xf) link(&(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='./file0\x00') fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0xfffffffffffffd38, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000140)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)={@local, @multicast2}, &(0x7f0000000580)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000600)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in=@local, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@remote}}, 0xe8) creat(&(0x7f00000002c0)='./file0\x00', 0x0) creat(&(0x7f0000000540)='./file0\x00', 0x0) getpgid(0x0) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000480)) ptrace$peekuser(0x3, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000500), 0x8) creat(&(0x7f0000000640)='./file1/file0\x00', 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000680), 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000100)}) 03:35:02 executing program 4: semctl$IPC_RMID(0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000040)) semget(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@remote, @in=@local}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000200)) geteuid() seccomp(0x0, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000ac0)) socket$key(0xf, 0x3, 0x2) shutdown(0xffffffffffffffff, 0x0) gettid() capget(&(0x7f0000000080), &(0x7f0000000140)) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211aaaa50f486c360d410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") epoll_wait(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getgid() stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000580)) getegid() getgid() syz_execute_func(&(0x7f0000000140)="428055a0726969ef69dc00d99069203737c3397c2a0626a540a52ef34298c4215971e400e5e5c4a2a10f9344613232231569c8212e1a1a3ef0f6585501c4e1edd1f631a3b786e298edc4227992749f55") 03:35:02 executing program 4: clock_gettime(0x7fffffffffffffc, &(0x7f0000000440)) open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000940)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f00000005c0)=""/96) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000080), &(0x7f00000002c0)=0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) getgid() ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000280)='bpq0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket(0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) socket(0x0, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), 0x8) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0xffffffffffffff73, &(0x7f0000847000), 0x1f2, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000004ac0), 0x0, 0x0) close(0xffffffffffffffff) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:02 executing program 4: clock_gettime(0x7fffffffffffffc, &(0x7f0000000440)) open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000940)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f00000005c0)=""/96) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000080), &(0x7f00000002c0)=0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) getgid() ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000280)='bpq0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket(0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) socket(0x0, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), 0x8) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0xffffffffffffff73, &(0x7f0000847000), 0x1f2, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000004ac0), 0x0, 0x0) close(0xffffffffffffffff) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:02 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000280)) unshare(0x6c000000) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000140)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x0, 0x2000}, 0x4) ioctl$KDDELIO(r1, 0x4b35, 0x8) timerfd_settime(r1, 0xfffffffffffffffd, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000180)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000002c0)={r3, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) write$P9_RLOPEN(r1, &(0x7f00000001c0)={0x18, 0xd, 0x2, {{0x18, 0x2, 0x7}, 0x3}}, 0x18) pipe2(&(0x7f0000000200), 0x80800) pipe(&(0x7f0000001400)) clock_gettime(0x8000000000, &(0x7f0000000340)) mq_timedreceive(r0, &(0x7f0000000380)=""/4096, 0x1000, 0x9, &(0x7f0000000300)) bpf$OBJ_GET_MAP(0x7, &(0x7f00000013c0)={&(0x7f0000001380)='./file0\x00', 0x0, 0x10}, 0x10) socket$packet(0x11, 0x0, 0x300) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100}) [ 729.538714] IPVS: ftp: loaded support on port[0] = 21 03:35:03 executing program 1: clock_gettime(0x4, &(0x7f0000001140)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:03 executing program 5: clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000080)) clock_settime(0x0, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000440)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast2}, 'syz_tun\x00'}) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000540)) socket$packet(0x11, 0x0, 0x300) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f00000003c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000005c0)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000002c0)) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) getuid() lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000580)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002ec0)={{{@in=@multicast1, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002fc0)=0xe8) getresuid(&(0x7f0000003240), &(0x7f0000003280), &(0x7f00000032c0)) lstat(&(0x7f0000003300)='./file0\x00', &(0x7f0000003340)) lstat(&(0x7f00000033c0)='./file0\x00', &(0x7f0000003400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003500)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000003600)=0xe8) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:03 executing program 0: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200), &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0x28, &(0x7f00000000c0)}, 0x10) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) getrusage(0x0, &(0x7f0000000240)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) sched_setattr(0x0, &(0x7f00000003c0), 0x0) geteuid() getresgid(&(0x7f00000000c0), &(0x7f00000001c0), &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[]) fchown(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) faccessat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000640)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000140)="42805da0120fef69dc0f01ee67f04683090019fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae519f075450f2e1a44dbe264642e3e0f1be80703") 03:35:03 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000280)) unshare(0x6c000000) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000140)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x0, 0x2000}, 0x4) ioctl$KDDELIO(r1, 0x4b35, 0x8) timerfd_settime(r1, 0xfffffffffffffffd, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000180)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000002c0)={r3, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) write$P9_RLOPEN(r1, &(0x7f00000001c0)={0x18, 0xd, 0x2, {{0x18, 0x2, 0x7}, 0x3}}, 0x18) pipe2(&(0x7f0000000200), 0x80800) pipe(&(0x7f0000001400)) clock_gettime(0x8000000000, &(0x7f0000000340)) mq_timedreceive(r0, &(0x7f0000000380)=""/4096, 0x1000, 0x9, &(0x7f0000000300)) bpf$OBJ_GET_MAP(0x7, &(0x7f00000013c0)={&(0x7f0000001380)='./file0\x00', 0x0, 0x10}, 0x10) socket$packet(0x11, 0x0, 0x300) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100}) 03:35:03 executing program 4: clock_gettime(0x7fffffffffffffc, &(0x7f0000000440)) open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000940)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f00000005c0)=""/96) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000080), &(0x7f00000002c0)=0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) getgid() ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000280)='bpq0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket(0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) socket(0x0, 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), 0x8) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f00003aefc8)={0x0, 0xffffffffffffff73, &(0x7f0000847000), 0x1f2, &(0x7f000048a000)}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000004ac0), 0x0, 0x0) close(0xffffffffffffffff) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") [ 730.025241] IPVS: ftp: loaded support on port[0] = 21 03:35:03 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000280)) unshare(0x6c000000) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000140)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x0, 0x2000}, 0x4) ioctl$KDDELIO(r1, 0x4b35, 0x8) timerfd_settime(r1, 0xfffffffffffffffd, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000000180)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000002c0)={r3, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) write$P9_RLOPEN(r1, &(0x7f00000001c0)={0x18, 0xd, 0x2, {{0x18, 0x2, 0x7}, 0x3}}, 0x18) pipe2(&(0x7f0000000200), 0x80800) pipe(&(0x7f0000001400)) clock_gettime(0x8000000000, &(0x7f0000000340)) mq_timedreceive(r0, &(0x7f0000000380)=""/4096, 0x1000, 0x9, &(0x7f0000000300)) bpf$OBJ_GET_MAP(0x7, &(0x7f00000013c0)={&(0x7f0000001380)='./file0\x00', 0x0, 0x10}, 0x10) socket$packet(0x11, 0x0, 0x300) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100}) [ 730.149278] kasan: CONFIG_KASAN_INLINE enabled [ 730.154573] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 730.162026] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 730.168274] CPU: 1 PID: 25597 Comm: syz-executor3 Not tainted 4.19.0-rc3-next-20180912+ #72 [ 730.176761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 730.186136] RIP: 0010:mqueue_get_tree+0xdd/0x2e0 [ 730.190894] Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 e3 01 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 6d 08 49 8d 7d 68 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 b6 01 00 00 4d 8b 6d 68 4d 85 ed 74 11 e8 1b 44 [ 730.209793] RSP: 0018:ffff88018280f928 EFLAGS: 00010a02 [ 730.215173] RAX: dffffc0000000000 RBX: ffff8801c69aabc0 RCX: ffffc90001ba6000 [ 730.222440] RDX: 1bd5a9d5a000000d RSI: ffffffff833deb15 RDI: dead4ead00000068 [ 730.229706] RBP: ffff88018280f948 R08: fffffbfff13555fd R09: fffffbfff13555fc [ 730.236970] R10: fffffbfff13555fc R11: ffffffff89aaafe3 R12: ffff8801cc268c80 [ 730.244235] R13: dead4ead00000000 R14: ffff8801c69aac58 R15: ffff8801c69aac58 [ 730.251507] FS: 00007f819be10700(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 730.259731] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 730.265622] CR2: 00007f2285680000 CR3: 00000001b79b9000 CR4: 00000000001406e0 [ 730.272891] Call Trace: [ 730.275486] vfs_get_tree+0x1cb/0x5c0 [ 730.279292] mq_create_mount+0xe3/0x190 [ 730.283274] mq_init_ns+0x15a/0x210 [ 730.286901] copy_ipcs+0x3d2/0x580 [ 730.290472] ? ipcns_get+0xe0/0xe0 [ 730.294017] ? do_mount+0x1db0/0x1db0 [ 730.297815] ? kmem_cache_alloc+0x33a/0x730 [ 730.302150] create_new_namespaces+0x376/0x900 [ 730.306740] ? sys_ni_syscall+0x20/0x20 [ 730.310720] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 730.316273] ? ns_capable_common+0x13f/0x170 [ 730.320689] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 730.325630] ksys_unshare+0x79c/0x10b0 [ 730.329764] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 730.334963] ? walk_process_tree+0x440/0x440 [ 730.339380] ? __fget_light+0x2e9/0x430 [ 730.343367] ? fget_raw+0x20/0x20 [ 730.346832] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 730.351764] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 730.357048] ? __x64_sys_futex+0x47f/0x6a0 [ 730.361287] ? do_syscall_64+0x9a/0x820 [ 730.365261] ? do_syscall_64+0x9a/0x820 [ 730.369254] ? lockdep_hardirqs_on+0x421/0x5c0 [ 730.373847] ? trace_hardirqs_on+0xbd/0x310 [ 730.378183] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 730.383721] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 730.389103] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 730.394584] ? ksys_ioctl+0x81/0xd0 [ 730.398239] __x64_sys_unshare+0x31/0x40 [ 730.402308] do_syscall_64+0x1b9/0x820 [ 730.406215] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 730.411578] ? syscall_return_slowpath+0x5e0/0x5e0 [ 730.416509] ? trace_hardirqs_on_caller+0x310/0x310 [ 730.421543] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 730.426565] ? recalc_sigpending_tsk+0x180/0x180 [ 730.431334] ? kasan_check_write+0x14/0x20 [ 730.436068] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 730.440921] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 730.446115] RIP: 0033:0x4572d9 [ 730.449331] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 730.468243] RSP: 002b:00007f819be0fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 730.475954] RAX: ffffffffffffffda RBX: 00007f819be106d4 RCX: 00000000004572d9 [ 730.483236] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006c000000 [ 730.490526] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 730.497796] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 730.505067] R13: 00000000004d7c40 R14: 00000000004caa82 R15: 0000000000000000 [ 730.512342] Modules linked in: [ 730.520170] ---[ end trace 9ee40b78121d500f ]--- [ 730.525342] RIP: 0010:mqueue_get_tree+0xdd/0x2e0 [ 730.530210] Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 e3 01 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 6d 08 49 8d 7d 68 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 b6 01 00 00 4d 8b 6d 68 4d 85 ed 74 11 e8 1b 44 [ 730.549255] RSP: 0018:ffff88018280f928 EFLAGS: 00010a02 [ 730.555034] RAX: dffffc0000000000 RBX: ffff8801c69aabc0 RCX: ffffc90001ba6000 [ 730.562485] RDX: 1bd5a9d5a000000d RSI: ffffffff833deb15 RDI: dead4ead00000068 [ 730.569865] RBP: ffff88018280f948 R08: fffffbfff13555fd R09: fffffbfff13555fc [ 730.577266] R10: fffffbfff13555fc R11: ffffffff89aaafe3 R12: ffff8801cc268c80 [ 730.584716] R13: dead4ead00000000 R14: ffff8801c69aac58 R15: ffff8801c69aac58 [ 730.592248] FS: 00007f819be10700(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 730.600623] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 730.606705] CR2: 00007f2285680000 CR3: 00000001b79b9000 CR4: 00000000001406e0 [ 730.614162] Kernel panic - not syncing: Fatal exception [ 730.620495] Kernel Offset: disabled [ 730.624115] Rebooting in 86400 seconds..