0x6, @dev}, &(0x7f0000003ec0)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000004000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004040)=0x14) 10:20:41 executing program 5: unshare(0x8000003) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000003c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cgroup.controllers\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000580)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000106c0)) getitimer(0x0, &(0x7f0000000240)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)=""/195, &(0x7f00000002c0)=0xfffffffffffffef2) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="42805da0bd0fef69dc0f01eece6dfa19fa380f38218f8978972bf0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac46279db67444472e671fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000007c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000880)={{{@in6, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@broadcast, @in=@loopback}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'bpq0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000cc0)={{{@in=@multicast2, @in=@local}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6=@loopback, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in=@rand_addr, @in6}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000003180)={@dev}, &(0x7f00000031c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000032c0)={{{@in=@multicast2, @in=@local}}, {{@in=@local}}}, &(0x7f00000033c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003400)={{{@in6=@ipv4={[], [], @multicast2}, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000003500)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003540)={{{@in6=@ipv4={[], [], @remote}, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000003640)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003680)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003700)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000037c0)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003800)={'bridge_slave_1\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003840)={0x0, @dev, @dev}, &(0x7f0000003880)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000003900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003940)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003980)={@mcast1}, &(0x7f00000039c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003b40)={{{@in, @in6=@mcast1}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000003c40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003cc0)={0x0, @local, @local}, &(0x7f0000003d00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003d40)={{{@in=@remote, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000003e40)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000003e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003ec0)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000004000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004040)=0x14) 10:20:41 executing program 1: timerfd_create(0x7, 0x0) memfd_create(&(0x7f00000000c0)='}%!\x00', 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002c40)) getresuid(&(0x7f0000002c80), &(0x7f0000002cc0), &(0x7f0000002d00)) stat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002e00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000002e40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002ec0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4}}, &(0x7f0000003000)=0xe8) getgroups(0x0, &(0x7f0000003040)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003080)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f00000006c0)=""/180) fstat(0xffffffffffffffff, &(0x7f00000030c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003140), &(0x7f0000003180)=0xc) getpid() setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000340)={0x0, {{0x2, 0x0, @multicast2}}}, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000044c0)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000045c0)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000040)=""/14, 0xe, 0x0, &(0x7f0000000180)=@ethernet={0x0, @dev}, 0x80) getgroups(0x0, &(0x7f0000004600)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getegid() prctl$setmm(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) syz_execute_func(&(0x7f0000000200)="428055a03bfbfb69203737c3397c05bd060f3821440f8b0600000064a70f157a9e40b63a01f7c4a211b62c5e62010d42002e660fe095000000003ef0f6585501f245db850000000085c4227992dd289f") 10:20:41 executing program 3: unshare(0x8000003) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000003c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cgroup.controllers\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000580)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000106c0)) getitimer(0x0, &(0x7f0000000240)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)=""/195, &(0x7f00000002c0)=0xfffffffffffffef2) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="42805da0bd0fef69dc0f01eece6dfa19fa380f38218f8978972bf0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac46279db67444472e671fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000007c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000880)={{{@in6, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@broadcast, @in=@loopback}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'bpq0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000cc0)={{{@in=@multicast2, @in=@local}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6=@loopback, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in=@rand_addr, @in6}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000003180)={@dev}, &(0x7f00000031c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000032c0)={{{@in=@multicast2, @in=@local}}, {{@in=@local}}}, &(0x7f00000033c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003400)={{{@in6=@ipv4={[], [], @multicast2}, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000003500)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003540)={{{@in6=@ipv4={[], [], @remote}, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000003640)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003680)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003700)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000037c0)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003800)={'bridge_slave_1\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003840)={0x0, @dev, @dev}, &(0x7f0000003880)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000003900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003940)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003980)={@mcast1}, &(0x7f00000039c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003b40)={{{@in, @in6=@mcast1}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000003c40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003cc0)={0x0, @local, @local}, &(0x7f0000003d00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003d40)={{{@in=@remote, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000003e40)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000003e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003ec0)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000004000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004040)=0x14) 10:20:42 executing program 2: signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getpgrp(0xffffffffffffffff) getuid() stat(&(0x7f0000001500)='./bus\x00', &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./bus\x00', &(0x7f0000001680)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001700)) getuid() fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getuid() lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b40), &(0x7f0000001b80)=0xc) stat(&(0x7f0000001bc0)='./bus\x00', &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getresuid(&(0x7f0000001d00), &(0x7f0000001d40), &(0x7f0000001d80)) lstat(&(0x7f0000001dc0)='./bus\x00', &(0x7f0000001e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001ec0)={{{@in6=@dev, @in=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000001fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002a00)) getegid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a80)={{{@in6=@ipv4={[], [], @local}}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002b80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:20:42 executing program 0: futex(&(0x7f0000000040)=0x2, 0x3, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)=0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000180), 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x400, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 10:20:42 executing program 4: unshare(0x8000003) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000003c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cgroup.controllers\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000580)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000106c0)) getitimer(0x0, &(0x7f0000000240)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)=""/195, &(0x7f00000002c0)=0xfffffffffffffef2) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="42805da0bd0fef69dc0f01eece6dfa19fa380f38218f8978972bf0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac46279db67444472e671fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000007c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000880)={{{@in6, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@broadcast, @in=@loopback}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'bpq0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000cc0)={{{@in=@multicast2, @in=@local}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6=@loopback, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in=@rand_addr, @in6}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000003180)={@dev}, &(0x7f00000031c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000032c0)={{{@in=@multicast2, @in=@local}}, {{@in=@local}}}, &(0x7f00000033c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003400)={{{@in6=@ipv4={[], [], @multicast2}, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000003500)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003540)={{{@in6=@ipv4={[], [], @remote}, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000003640)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003680)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003700)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000037c0)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003800)={'bridge_slave_1\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003840)={0x0, @dev, @dev}, &(0x7f0000003880)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000003900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003940)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003980)={@mcast1}, &(0x7f00000039c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003b40)={{{@in, @in6=@mcast1}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000003c40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003cc0)={0x0, @local, @local}, &(0x7f0000003d00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003d40)={{{@in=@remote, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000003e40)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000003e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003ec0)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000004000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004040)=0x14) 10:20:42 executing program 4: unshare(0x8000003) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000003c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cgroup.controllers\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000580)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000106c0)) getitimer(0x0, &(0x7f0000000240)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)=""/195, &(0x7f00000002c0)=0xfffffffffffffef2) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="42805da0bd0fef69dc0f01eece6dfa19fa380f38218f8978972bf0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac46279db67444472e671fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000007c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000880)={{{@in6, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@broadcast, @in=@loopback}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'bpq0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000cc0)={{{@in=@multicast2, @in=@local}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6=@loopback, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in=@rand_addr, @in6}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000003180)={@dev}, &(0x7f00000031c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000032c0)={{{@in=@multicast2, @in=@local}}, {{@in=@local}}}, &(0x7f00000033c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003400)={{{@in6=@ipv4={[], [], @multicast2}, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000003500)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003540)={{{@in6=@ipv4={[], [], @remote}, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000003640)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003680)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003700)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000037c0)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003800)={'bridge_slave_1\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003840)={0x0, @dev, @dev}, &(0x7f0000003880)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000003900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003940)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003980)={@mcast1}, &(0x7f00000039c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003b40)={{{@in, @in6=@mcast1}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000003c40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003cc0)={0x0, @local, @local}, &(0x7f0000003d00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003d40)={{{@in=@remote, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000003e40)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000003e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003ec0)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000004000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004040)=0x14) 10:20:42 executing program 5: unshare(0x8000003) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000003c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cgroup.controllers\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000580)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000106c0)) getitimer(0x0, &(0x7f0000000240)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)=""/195, &(0x7f00000002c0)=0xfffffffffffffef2) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="42805da0bd0fef69dc0f01eece6dfa19fa380f38218f8978972bf0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac46279db67444472e671fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000007c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000880)={{{@in6, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@broadcast, @in=@loopback}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'bpq0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000cc0)={{{@in=@multicast2, @in=@local}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6=@loopback, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in=@rand_addr, @in6}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000003180)={@dev}, &(0x7f00000031c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000032c0)={{{@in=@multicast2, @in=@local}}, {{@in=@local}}}, &(0x7f00000033c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003400)={{{@in6=@ipv4={[], [], @multicast2}, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000003500)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003540)={{{@in6=@ipv4={[], [], @remote}, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000003640)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003680)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003700)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000037c0)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003800)={'bridge_slave_1\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003840)={0x0, @dev, @dev}, &(0x7f0000003880)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000003900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003940)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003980)={@mcast1}, &(0x7f00000039c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003b40)={{{@in, @in6=@mcast1}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000003c40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003cc0)={0x0, @local, @local}, &(0x7f0000003d00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003d40)={{{@in=@remote, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000003e40)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000003e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003ec0)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000004000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004040)=0x14) 10:20:42 executing program 3: futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000340), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getresuid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001480)={{{@in=@dev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000015c0)={{{@in6, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000016c0)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001700)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001880)={{{@in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000001980)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002b80)={{{@in, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000002c80)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002d00), &(0x7f0000002d40)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpid() getresuid(&(0x7f0000003000), &(0x7f0000003040), &(0x7f0000003080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000030c0), &(0x7f0000003100)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003180)={0x0, 0x0, &(0x7f0000002f40), 0x0, &(0x7f0000003140)}, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/158) recvmmsg(0xffffffffffffff9c, &(0x7f0000002a80), 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@remote, @in=@dev}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/commit_pending_bools\x00', 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuacct.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211a0f5bdbc19086d9f28fc9f3406d4175450f2e1a8fe978c6978000000022e52b9f26f4c40129154052") 10:20:42 executing program 1: timerfd_create(0x7, 0x0) memfd_create(&(0x7f00000000c0)='}%!\x00', 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002c40)) getresuid(&(0x7f0000002c80), &(0x7f0000002cc0), &(0x7f0000002d00)) stat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002e00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000002e40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002ec0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4}}, &(0x7f0000003000)=0xe8) getgroups(0x0, &(0x7f0000003040)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003080)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f00000006c0)=""/180) fstat(0xffffffffffffffff, &(0x7f00000030c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003140), &(0x7f0000003180)=0xc) getpid() setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000340)={0x0, {{0x2, 0x0, @multicast2}}}, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000044c0)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000045c0)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000040)=""/14, 0xe, 0x0, &(0x7f0000000180)=@ethernet={0x0, @dev}, 0x80) getgroups(0x0, &(0x7f0000004600)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getegid() prctl$setmm(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) syz_execute_func(&(0x7f0000000200)="428055a03bfbfb69203737c3397c05bd060f3821440f8b0600000064a70f157a9e40b63a01f7c4a211b62c5e62010d42002e660fe095000000003ef0f6585501f245db850000000085c4227992dd289f") 10:20:42 executing program 4: signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='/dev/rtc0\x00', 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000140), 0x4) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) timerfd_create(0x0, 0x0) getsockname(0xffffffffffffff9c, &(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f00000003c0)=0x80) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @dev}}, 0x5c) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) getpgrp(0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) mlockall(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000001740), 0x0, 0x0, &(0x7f0000001800)={0x0, 0x989680}) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000180)}) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@multicast1}}}, &(0x7f0000000d80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e40), &(0x7f0000000e80)=0xc) lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002900)={{}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000002a00)=0xe8) lstat(&(0x7f0000002a40)='./file0\x00', &(0x7f0000002a80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002b00)={{{@in=@local, @in6=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000002c00)=0xe8) getgroups(0x0, &(0x7f0000002c40)) getresuid(&(0x7f0000002c80), &(0x7f0000002cc0), &(0x7f0000002d00)) fstat(0xffffffffffffffff, &(0x7f0000002d40)) fstat(0xffffffffffffffff, &(0x7f0000003240)) lstat(&(0x7f00000032c0)='./file0\x00', &(0x7f0000003300)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003380)={{{@in6=@local, @in6}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000003480)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000034c0), &(0x7f0000003500)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003540), &(0x7f0000003580)=0xc) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 10:20:42 executing program 3: futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000340), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getresuid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001480)={{{@in=@dev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000015c0)={{{@in6, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000016c0)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001700)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001880)={{{@in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000001980)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002b80)={{{@in, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000002c80)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002d00), &(0x7f0000002d40)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpid() getresuid(&(0x7f0000003000), &(0x7f0000003040), &(0x7f0000003080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000030c0), &(0x7f0000003100)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003180)={0x0, 0x0, &(0x7f0000002f40), 0x0, &(0x7f0000003140)}, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/158) recvmmsg(0xffffffffffffff9c, &(0x7f0000002a80), 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@remote, @in=@dev}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/commit_pending_bools\x00', 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuacct.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211a0f5bdbc19086d9f28fc9f3406d4175450f2e1a8fe978c6978000000022e52b9f26f4c40129154052") 10:20:42 executing program 3: futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000340), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getresuid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001480)={{{@in=@dev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000015c0)={{{@in6, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000016c0)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001700)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001880)={{{@in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000001980)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002b80)={{{@in, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000002c80)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002d00), &(0x7f0000002d40)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpid() getresuid(&(0x7f0000003000), &(0x7f0000003040), &(0x7f0000003080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000030c0), &(0x7f0000003100)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003180)={0x0, 0x0, &(0x7f0000002f40), 0x0, &(0x7f0000003140)}, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/158) recvmmsg(0xffffffffffffff9c, &(0x7f0000002a80), 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@remote, @in=@dev}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/commit_pending_bools\x00', 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuacct.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211a0f5bdbc19086d9f28fc9f3406d4175450f2e1a8fe978c6978000000022e52b9f26f4c40129154052") 10:20:43 executing program 2: signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getpgrp(0xffffffffffffffff) getuid() stat(&(0x7f0000001500)='./bus\x00', &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./bus\x00', &(0x7f0000001680)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001700)) getuid() fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getuid() lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b40), &(0x7f0000001b80)=0xc) stat(&(0x7f0000001bc0)='./bus\x00', &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getresuid(&(0x7f0000001d00), &(0x7f0000001d40), &(0x7f0000001d80)) lstat(&(0x7f0000001dc0)='./bus\x00', &(0x7f0000001e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001ec0)={{{@in6=@dev, @in=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000001fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002a00)) getegid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a80)={{{@in6=@ipv4={[], [], @local}}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002b80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:20:43 executing program 3: futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000340), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getresuid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001480)={{{@in=@dev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000015c0)={{{@in6, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000016c0)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001700)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001880)={{{@in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000001980)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002b80)={{{@in, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000002c80)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002d00), &(0x7f0000002d40)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpid() getresuid(&(0x7f0000003000), &(0x7f0000003040), &(0x7f0000003080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000030c0), &(0x7f0000003100)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003180)={0x0, 0x0, &(0x7f0000002f40), 0x0, &(0x7f0000003140)}, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/158) recvmmsg(0xffffffffffffff9c, &(0x7f0000002a80), 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@remote, @in=@dev}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/commit_pending_bools\x00', 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuacct.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211a0f5bdbc19086d9f28fc9f3406d4175450f2e1a8fe978c6978000000022e52b9f26f4c40129154052") 10:20:43 executing program 0: futex(&(0x7f0000000040)=0x2, 0x3, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)=0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000180), 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x400, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 10:20:43 executing program 3: futex(&(0x7f0000000040)=0x2, 0x3, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)=0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000180), 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x400, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 10:20:43 executing program 5: unshare(0x8000003) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000003c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cgroup.controllers\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000580)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000106c0)) getitimer(0x0, &(0x7f0000000240)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)=""/195, &(0x7f00000002c0)=0xfffffffffffffef2) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="42805da0bd0fef69dc0f01eece6dfa19fa380f38218f8978972bf0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac46279db67444472e671fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000007c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000880)={{{@in6, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@broadcast, @in=@loopback}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'bpq0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000cc0)={{{@in=@multicast2, @in=@local}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6=@loopback, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in=@rand_addr, @in6}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000003180)={@dev}, &(0x7f00000031c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000032c0)={{{@in=@multicast2, @in=@local}}, {{@in=@local}}}, &(0x7f00000033c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003400)={{{@in6=@ipv4={[], [], @multicast2}, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000003500)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003540)={{{@in6=@ipv4={[], [], @remote}, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000003640)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003680)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003700)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000037c0)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003800)={'bridge_slave_1\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003840)={0x0, @dev, @dev}, &(0x7f0000003880)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000003900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003940)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003980)={@mcast1}, &(0x7f00000039c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003b40)={{{@in, @in6=@mcast1}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000003c40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003cc0)={0x0, @local, @local}, &(0x7f0000003d00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003d40)={{{@in=@remote, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000003e40)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000003e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003ec0)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000004000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004040)=0x14) 10:20:43 executing program 2: signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getpgrp(0xffffffffffffffff) getuid() stat(&(0x7f0000001500)='./bus\x00', &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./bus\x00', &(0x7f0000001680)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001700)) getuid() fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getuid() lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b40), &(0x7f0000001b80)=0xc) stat(&(0x7f0000001bc0)='./bus\x00', &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getresuid(&(0x7f0000001d00), &(0x7f0000001d40), &(0x7f0000001d80)) lstat(&(0x7f0000001dc0)='./bus\x00', &(0x7f0000001e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001ec0)={{{@in6=@dev, @in=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000001fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002a00)) getegid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a80)={{{@in6=@ipv4={[], [], @local}}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002b80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:20:44 executing program 1: futex(&(0x7f0000000040)=0x2, 0x3, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)=0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000180), 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x400, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 10:20:44 executing program 4: signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='/dev/rtc0\x00', 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000140), 0x4) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) timerfd_create(0x0, 0x0) getsockname(0xffffffffffffff9c, &(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f00000003c0)=0x80) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @dev}}, 0x5c) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) getpgrp(0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) mlockall(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000001740), 0x0, 0x0, &(0x7f0000001800)={0x0, 0x989680}) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000180)}) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@multicast1}}}, &(0x7f0000000d80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e40), &(0x7f0000000e80)=0xc) lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002900)={{}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000002a00)=0xe8) lstat(&(0x7f0000002a40)='./file0\x00', &(0x7f0000002a80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002b00)={{{@in=@local, @in6=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000002c00)=0xe8) getgroups(0x0, &(0x7f0000002c40)) getresuid(&(0x7f0000002c80), &(0x7f0000002cc0), &(0x7f0000002d00)) fstat(0xffffffffffffffff, &(0x7f0000002d40)) fstat(0xffffffffffffffff, &(0x7f0000003240)) lstat(&(0x7f00000032c0)='./file0\x00', &(0x7f0000003300)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003380)={{{@in6=@local, @in6}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000003480)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000034c0), &(0x7f0000003500)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003540), &(0x7f0000003580)=0xc) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 10:20:44 executing program 5: futex(&(0x7f0000000040)=0x2, 0x3, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)=0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000180), 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x400, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 10:20:44 executing program 0: futex(&(0x7f0000000040)=0x2, 0x3, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)=0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000180), 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x400, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 10:20:44 executing program 3: futex(&(0x7f0000000040)=0x2, 0x3, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)=0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000180), 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x400, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 10:20:44 executing program 2: signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getpgrp(0xffffffffffffffff) getuid() stat(&(0x7f0000001500)='./bus\x00', &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./bus\x00', &(0x7f0000001680)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001700)) getuid() fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getuid() lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b40), &(0x7f0000001b80)=0xc) stat(&(0x7f0000001bc0)='./bus\x00', &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getresuid(&(0x7f0000001d00), &(0x7f0000001d40), &(0x7f0000001d80)) lstat(&(0x7f0000001dc0)='./bus\x00', &(0x7f0000001e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001ec0)={{{@in6=@dev, @in=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000001fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002a00)) getegid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a80)={{{@in6=@ipv4={[], [], @local}}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002b80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:20:44 executing program 1: futex(&(0x7f0000000040)=0x2, 0x3, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)=0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000180), 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x400, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 10:20:45 executing program 4: signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='/dev/rtc0\x00', 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000140), 0x4) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) timerfd_create(0x0, 0x0) getsockname(0xffffffffffffff9c, &(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f00000003c0)=0x80) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @dev}}, 0x5c) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) getpgrp(0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) mlockall(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000001740), 0x0, 0x0, &(0x7f0000001800)={0x0, 0x989680}) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000180)}) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@multicast1}}}, &(0x7f0000000d80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e40), &(0x7f0000000e80)=0xc) lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002900)={{}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000002a00)=0xe8) lstat(&(0x7f0000002a40)='./file0\x00', &(0x7f0000002a80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002b00)={{{@in=@local, @in6=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000002c00)=0xe8) getgroups(0x0, &(0x7f0000002c40)) getresuid(&(0x7f0000002c80), &(0x7f0000002cc0), &(0x7f0000002d00)) fstat(0xffffffffffffffff, &(0x7f0000002d40)) fstat(0xffffffffffffffff, &(0x7f0000003240)) lstat(&(0x7f00000032c0)='./file0\x00', &(0x7f0000003300)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003380)={{{@in6=@local, @in6}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000003480)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000034c0), &(0x7f0000003500)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003540), &(0x7f0000003580)=0xc) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 10:20:45 executing program 2: futex(&(0x7f0000000040)=0x2, 0x3, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)=0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000180), 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x400, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 10:20:45 executing program 5: futex(&(0x7f0000000040)=0x2, 0x3, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)=0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000180), 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x400, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 10:20:45 executing program 0: futex(&(0x7f0000000040)=0x2, 0x3, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)=0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000180), 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x400, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 10:20:45 executing program 3: futex(&(0x7f0000000040)=0x2, 0x3, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)=0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000180), 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x400, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 10:20:46 executing program 1: futex(&(0x7f0000000040)=0x2, 0x3, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)=0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000180), 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x400, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 10:20:46 executing program 4: signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='/dev/rtc0\x00', 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000140), 0x4) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) timerfd_create(0x0, 0x0) getsockname(0xffffffffffffff9c, &(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f00000003c0)=0x80) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @dev}}, 0x5c) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) getpgrp(0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) mlockall(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000001740), 0x0, 0x0, &(0x7f0000001800)={0x0, 0x989680}) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000180)}) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@multicast1}}}, &(0x7f0000000d80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e40), &(0x7f0000000e80)=0xc) lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002900)={{}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000002a00)=0xe8) lstat(&(0x7f0000002a40)='./file0\x00', &(0x7f0000002a80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002b00)={{{@in=@local, @in6=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000002c00)=0xe8) getgroups(0x0, &(0x7f0000002c40)) getresuid(&(0x7f0000002c80), &(0x7f0000002cc0), &(0x7f0000002d00)) fstat(0xffffffffffffffff, &(0x7f0000002d40)) fstat(0xffffffffffffffff, &(0x7f0000003240)) lstat(&(0x7f00000032c0)='./file0\x00', &(0x7f0000003300)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003380)={{{@in6=@local, @in6}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000003480)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000034c0), &(0x7f0000003500)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003540), &(0x7f0000003580)=0xc) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 10:20:46 executing program 0: signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getpgrp(0xffffffffffffffff) getuid() stat(&(0x7f0000001500)='./bus\x00', &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./bus\x00', &(0x7f0000001680)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001700)) getuid() fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getuid() lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b40), &(0x7f0000001b80)=0xc) stat(&(0x7f0000001bc0)='./bus\x00', &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getresuid(&(0x7f0000001d00), &(0x7f0000001d40), &(0x7f0000001d80)) lstat(&(0x7f0000001dc0)='./bus\x00', &(0x7f0000001e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001ec0)={{{@in6=@dev, @in=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000001fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002a00)) getegid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a80)={{{@in6=@ipv4={[], [], @local}}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002b80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:20:47 executing program 1: futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000340), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getresuid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001480)={{{@in=@dev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000015c0)={{{@in6, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000016c0)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001700)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001880)={{{@in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000001980)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002b80)={{{@in, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000002c80)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002d00), &(0x7f0000002d40)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpid() getresuid(&(0x7f0000003000), &(0x7f0000003040), &(0x7f0000003080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000030c0), &(0x7f0000003100)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003180)={0x0, 0x0, &(0x7f0000002f40), 0x0, &(0x7f0000003140)}, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/158) recvmmsg(0xffffffffffffff9c, &(0x7f0000002a80), 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@remote, @in=@dev}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/commit_pending_bools\x00', 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuacct.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211a0f5bdbc19086d9f28fc9f3406d4175450f2e1a8fe978c6978000000022e52b9f26f4c40129154052") 10:20:47 executing program 3: syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, 0x6e) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") stat(&(0x7f0000000500)='./file0\x00', &(0x7f00000009c0)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000540)=0xc) open(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000000e40), 0x8) syz_open_pts(0xffffffffffffff9c, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000740)='/dev/uhid\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 10:20:47 executing program 2: futex(&(0x7f0000000040)=0x2, 0x3, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)=0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000180), 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x400, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 10:20:47 executing program 1: futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000340), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getresuid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001480)={{{@in=@dev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000015c0)={{{@in6, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000016c0)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001700)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001880)={{{@in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000001980)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002b80)={{{@in, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000002c80)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002d00), &(0x7f0000002d40)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpid() getresuid(&(0x7f0000003000), &(0x7f0000003040), &(0x7f0000003080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000030c0), &(0x7f0000003100)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003180)={0x0, 0x0, &(0x7f0000002f40), 0x0, &(0x7f0000003140)}, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/158) recvmmsg(0xffffffffffffff9c, &(0x7f0000002a80), 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@remote, @in=@dev}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/commit_pending_bools\x00', 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuacct.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211a0f5bdbc19086d9f28fc9f3406d4175450f2e1a8fe978c6978000000022e52b9f26f4c40129154052") 10:20:47 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @multicast1, @rand_addr}, &(0x7f00000000c0)=0xc) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pipe2(&(0x7f00000004c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000900)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200)) gettid() syz_open_procfs(0x0, &(0x7f0000000380)='net/arp\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:20:47 executing program 5: futex(&(0x7f0000000040)=0x2, 0x3, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)=0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000180), 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x400, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 10:20:47 executing program 1: futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000340), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getresuid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001480)={{{@in=@dev, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000015c0)={{{@in6, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000016c0)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001700)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001880)={{{@in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000001980)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002b80)={{{@in, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000002c80)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002d00), &(0x7f0000002d40)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpid() getresuid(&(0x7f0000003000), &(0x7f0000003040), &(0x7f0000003080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000030c0), &(0x7f0000003100)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000003180)={0x0, 0x0, &(0x7f0000002f40), 0x0, &(0x7f0000003140)}, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/158) recvmmsg(0xffffffffffffff9c, &(0x7f0000002a80), 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@remote, @in=@dev}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/commit_pending_bools\x00', 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuacct.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211a0f5bdbc19086d9f28fc9f3406d4175450f2e1a8fe978c6978000000022e52b9f26f4c40129154052") 10:20:47 executing program 0: signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getpgrp(0xffffffffffffffff) getuid() stat(&(0x7f0000001500)='./bus\x00', &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./bus\x00', &(0x7f0000001680)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001700)) getuid() fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getuid() lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b40), &(0x7f0000001b80)=0xc) stat(&(0x7f0000001bc0)='./bus\x00', &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getresuid(&(0x7f0000001d00), &(0x7f0000001d40), &(0x7f0000001d80)) lstat(&(0x7f0000001dc0)='./bus\x00', &(0x7f0000001e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001ec0)={{{@in6=@dev, @in=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000001fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002a00)) getegid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a80)={{{@in6=@ipv4={[], [], @local}}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002b80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:20:47 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x10001}, 0x10) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/commit_pending_bools\x00', 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0) memfd_create(&(0x7f0000000380)='\x00', 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) openat$selinux_create(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/create\x00', 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000440)={0x0, &(0x7f0000000400)}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$nbd(&(0x7f0000000580)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000680)={&(0x7f0000000540), 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/48, 0x30, 0x0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000003c0)='trusted.overlay.opaque\x00', &(0x7f0000000480)='y\x00', 0x2, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240)='rxrpc\x00', 0x0) 10:20:48 executing program 3: syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, 0x6e) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") stat(&(0x7f0000000500)='./file0\x00', &(0x7f00000009c0)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000540)=0xc) open(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000000e40), 0x8) syz_open_pts(0xffffffffffffff9c, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000740)='/dev/uhid\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 10:20:48 executing program 2: futex(&(0x7f0000000040)=0x2, 0x3, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)=0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000180), 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x400, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xff6c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 10:20:48 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @multicast1, @rand_addr}, &(0x7f00000000c0)=0xc) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pipe2(&(0x7f00000004c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000900)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200)) gettid() syz_open_procfs(0x0, &(0x7f0000000380)='net/arp\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:20:48 executing program 0: signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getpgrp(0xffffffffffffffff) getuid() stat(&(0x7f0000001500)='./bus\x00', &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./bus\x00', &(0x7f0000001680)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001700)) getuid() fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getuid() lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b40), &(0x7f0000001b80)=0xc) stat(&(0x7f0000001bc0)='./bus\x00', &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getresuid(&(0x7f0000001d00), &(0x7f0000001d40), &(0x7f0000001d80)) lstat(&(0x7f0000001dc0)='./bus\x00', &(0x7f0000001e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001ec0)={{{@in6=@dev, @in=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000001fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002a00)) getegid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a80)={{{@in6=@ipv4={[], [], @local}}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002b80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:20:48 executing program 5: syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, 0x6e) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") stat(&(0x7f0000000500)='./file0\x00', &(0x7f00000009c0)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000540)=0xc) open(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000000e40), 0x8) syz_open_pts(0xffffffffffffff9c, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000740)='/dev/uhid\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 10:20:48 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x10001}, 0x10) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/commit_pending_bools\x00', 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0) memfd_create(&(0x7f0000000380)='\x00', 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) openat$selinux_create(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/create\x00', 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000440)={0x0, &(0x7f0000000400)}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$nbd(&(0x7f0000000580)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000680)={&(0x7f0000000540), 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/48, 0x30, 0x0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000003c0)='trusted.overlay.opaque\x00', &(0x7f0000000480)='y\x00', 0x2, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240)='rxrpc\x00', 0x0) 10:20:48 executing program 3: syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, 0x6e) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") stat(&(0x7f0000000500)='./file0\x00', &(0x7f00000009c0)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000540)=0xc) open(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000000e40), 0x8) syz_open_pts(0xffffffffffffff9c, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000740)='/dev/uhid\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 10:20:49 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @multicast1, @rand_addr}, &(0x7f00000000c0)=0xc) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pipe2(&(0x7f00000004c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000900)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200)) gettid() syz_open_procfs(0x0, &(0x7f0000000380)='net/arp\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:20:49 executing program 0: syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, 0x6e) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") stat(&(0x7f0000000500)='./file0\x00', &(0x7f00000009c0)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000540)=0xc) open(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000000e40), 0x8) syz_open_pts(0xffffffffffffff9c, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000740)='/dev/uhid\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 10:20:49 executing program 5: syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, 0x6e) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") stat(&(0x7f0000000500)='./file0\x00', &(0x7f00000009c0)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000540)=0xc) open(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000000e40), 0x8) syz_open_pts(0xffffffffffffff9c, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000740)='/dev/uhid\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 10:20:49 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x10001}, 0x10) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/commit_pending_bools\x00', 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0) memfd_create(&(0x7f0000000380)='\x00', 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) openat$selinux_create(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/create\x00', 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000440)={0x0, &(0x7f0000000400)}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$nbd(&(0x7f0000000580)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000680)={&(0x7f0000000540), 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/48, 0x30, 0x0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000003c0)='trusted.overlay.opaque\x00', &(0x7f0000000480)='y\x00', 0x2, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240)='rxrpc\x00', 0x0) 10:20:49 executing program 2: keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f00000001c0)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001800)) gettid() getpgid(0x0) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getgid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getpgid(0x0) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@dev}}}, &(0x7f0000000940)=0xe8) getgroups(0x0, &(0x7f0000000980)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000fc0)=0xe8) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000010c0)={{{@in6=@local, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000011c0)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001200)={{{@in=@loopback, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000001300)=0xe8) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001540)=0xe8) getgid() ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 10:20:49 executing program 3: syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, 0x6e) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") stat(&(0x7f0000000500)='./file0\x00', &(0x7f00000009c0)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000540)=0xc) open(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000000e40), 0x8) syz_open_pts(0xffffffffffffff9c, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000740)='/dev/uhid\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 10:20:49 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @multicast1, @rand_addr}, &(0x7f00000000c0)=0xc) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pipe2(&(0x7f00000004c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000900)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200)) gettid() syz_open_procfs(0x0, &(0x7f0000000380)='net/arp\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:20:50 executing program 0: syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, 0x6e) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") stat(&(0x7f0000000500)='./file0\x00', &(0x7f00000009c0)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000540)=0xc) open(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000000e40), 0x8) syz_open_pts(0xffffffffffffff9c, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000740)='/dev/uhid\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 10:20:50 executing program 5: syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, 0x6e) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") stat(&(0x7f0000000500)='./file0\x00', &(0x7f00000009c0)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000540)=0xc) open(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000000e40), 0x8) syz_open_pts(0xffffffffffffff9c, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000740)='/dev/uhid\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 10:20:50 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x10001}, 0x10) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/commit_pending_bools\x00', 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0) memfd_create(&(0x7f0000000380)='\x00', 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) openat$selinux_create(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/create\x00', 0x2, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000440)={0x0, &(0x7f0000000400)}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$nbd(&(0x7f0000000580)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000680)={&(0x7f0000000540), 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/48, 0x30, 0x0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000003c0)='trusted.overlay.opaque\x00', &(0x7f0000000480)='y\x00', 0x2, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240)='rxrpc\x00', 0x0) 10:20:50 executing program 2: keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f00000001c0)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001800)) gettid() getpgid(0x0) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getgid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getpgid(0x0) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@dev}}}, &(0x7f0000000940)=0xe8) getgroups(0x0, &(0x7f0000000980)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000fc0)=0xe8) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000010c0)={{{@in6=@local, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000011c0)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001200)={{{@in=@loopback, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000001300)=0xe8) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001540)=0xe8) getgid() ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 10:20:50 executing program 3: keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f00000001c0)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001800)) gettid() getpgid(0x0) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getgid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getpgid(0x0) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@dev}}}, &(0x7f0000000940)=0xe8) getgroups(0x0, &(0x7f0000000980)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000fc0)=0xe8) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000010c0)={{{@in6=@local, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000011c0)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001200)={{{@in=@loopback, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000001300)=0xe8) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001540)=0xe8) getgid() ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 10:20:50 executing program 4: keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f00000001c0)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001800)) gettid() getpgid(0x0) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getgid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getpgid(0x0) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@dev}}}, &(0x7f0000000940)=0xe8) getgroups(0x0, &(0x7f0000000980)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000fc0)=0xe8) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000010c0)={{{@in6=@local, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000011c0)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001200)={{{@in=@loopback, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000001300)=0xe8) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001540)=0xe8) getgid() ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 10:20:50 executing program 0: syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, 0x6e) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000440)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") stat(&(0x7f0000000500)='./file0\x00', &(0x7f00000009c0)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000540)=0xc) open(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000000e40), 0x8) syz_open_pts(0xffffffffffffff9c, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000740)='/dev/uhid\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 10:20:50 executing program 5: sysinfo(&(0x7f0000000380)=""/4096) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000280)=""/212, &(0x7f0000001380)=0xd4) pipe(&(0x7f0000000040)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000140)) getresuid(&(0x7f00000014c0), &(0x7f0000001500), &(0x7f0000001540)) getresuid(&(0x7f0000001580), &(0x7f00000015c0), &(0x7f0000001600)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001640)={{{@in6=@local, @in6}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001740)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001880)=0xe8) getegid() getgroups(0x0, &(0x7f00000018c0)) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 10:20:51 executing program 1: getrusage(0x1, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@dev, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000004240)='systemselinuxvboxnet0\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000042c0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000043c0)=0xe8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000140)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14}, 0x14}}, 0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f00000056c0), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) getpid() inotify_init() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@remote, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 10:20:51 executing program 2: keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f00000001c0)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001800)) gettid() getpgid(0x0) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getgid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getpgid(0x0) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@dev}}}, &(0x7f0000000940)=0xe8) getgroups(0x0, &(0x7f0000000980)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000fc0)=0xe8) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000010c0)={{{@in6=@local, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000011c0)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001200)={{{@in=@loopback, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000001300)=0xe8) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001540)=0xe8) getgid() ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 10:20:51 executing program 3: keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f00000001c0)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001800)) gettid() getpgid(0x0) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getgid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getpgid(0x0) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@dev}}}, &(0x7f0000000940)=0xe8) getgroups(0x0, &(0x7f0000000980)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000fc0)=0xe8) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000010c0)={{{@in6=@local, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000011c0)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001200)={{{@in=@loopback, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000001300)=0xe8) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001540)=0xe8) getgid() ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 10:20:51 executing program 4: keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f00000001c0)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001800)) gettid() getpgid(0x0) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getgid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getpgid(0x0) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@dev}}}, &(0x7f0000000940)=0xe8) getgroups(0x0, &(0x7f0000000980)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000fc0)=0xe8) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000010c0)={{{@in6=@local, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000011c0)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001200)={{{@in=@loopback, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000001300)=0xe8) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001540)=0xe8) getgid() ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 10:20:51 executing program 0: eventfd(0x0) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) request_key(&(0x7f0000000300)='asymmetric\x00', &(0x7f00000003c0), &(0x7f0000000400)='syzkaller\x00', 0xfffffffffffffffe) keyctl$get_security(0x11, 0x0, &(0x7f0000000440)=""/34, 0x22) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000480)) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") add_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffffa) keyctl$invalidate(0x15, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200), 0x4) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000580)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 10:20:51 executing program 5: sysinfo(&(0x7f0000000380)=""/4096) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000280)=""/212, &(0x7f0000001380)=0xd4) pipe(&(0x7f0000000040)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000140)) getresuid(&(0x7f00000014c0), &(0x7f0000001500), &(0x7f0000001540)) getresuid(&(0x7f0000001580), &(0x7f00000015c0), &(0x7f0000001600)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001640)={{{@in6=@local, @in6}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001740)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001880)=0xe8) getegid() getgroups(0x0, &(0x7f00000018c0)) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 10:20:51 executing program 0: eventfd(0x0) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) request_key(&(0x7f0000000300)='asymmetric\x00', &(0x7f00000003c0), &(0x7f0000000400)='syzkaller\x00', 0xfffffffffffffffe) keyctl$get_security(0x11, 0x0, &(0x7f0000000440)=""/34, 0x22) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000480)) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") add_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffffa) keyctl$invalidate(0x15, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200), 0x4) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000580)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 10:20:52 executing program 1: getrusage(0x1, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@dev, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000004240)='systemselinuxvboxnet0\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000042c0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000043c0)=0xe8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000140)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14}, 0x14}}, 0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f00000056c0), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) getpid() inotify_init() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@remote, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 10:20:52 executing program 0: eventfd(0x0) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) request_key(&(0x7f0000000300)='asymmetric\x00', &(0x7f00000003c0), &(0x7f0000000400)='syzkaller\x00', 0xfffffffffffffffe) keyctl$get_security(0x11, 0x0, &(0x7f0000000440)=""/34, 0x22) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000480)) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") add_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffffa) keyctl$invalidate(0x15, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200), 0x4) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000580)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 10:20:52 executing program 2: keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f00000001c0)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001800)) gettid() getpgid(0x0) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getgid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getpgid(0x0) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@dev}}}, &(0x7f0000000940)=0xe8) getgroups(0x0, &(0x7f0000000980)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000fc0)=0xe8) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000010c0)={{{@in6=@local, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000011c0)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001200)={{{@in=@loopback, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000001300)=0xe8) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001540)=0xe8) getgid() ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 10:20:52 executing program 3: keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f00000001c0)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001800)) gettid() getpgid(0x0) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getgid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getpgid(0x0) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@dev}}}, &(0x7f0000000940)=0xe8) getgroups(0x0, &(0x7f0000000980)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000fc0)=0xe8) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000010c0)={{{@in6=@local, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000011c0)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001200)={{{@in=@loopback, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000001300)=0xe8) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001540)=0xe8) getgid() ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 10:20:52 executing program 0: eventfd(0x0) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) request_key(&(0x7f0000000300)='asymmetric\x00', &(0x7f00000003c0), &(0x7f0000000400)='syzkaller\x00', 0xfffffffffffffffe) keyctl$get_security(0x11, 0x0, &(0x7f0000000440)=""/34, 0x22) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000480)) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") add_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffffa) keyctl$invalidate(0x15, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200), 0x4) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000580)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 10:20:52 executing program 4: keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f00000001c0)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001800)) gettid() getpgid(0x0) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getgid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getpgid(0x0) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@dev}}}, &(0x7f0000000940)=0xe8) getgroups(0x0, &(0x7f0000000980)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000fc0)=0xe8) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000010c0)={{{@in6=@local, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000011c0)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001200)={{{@in=@loopback, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000001300)=0xe8) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001540)=0xe8) getgid() ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 10:20:52 executing program 0: eventfd(0x0) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) request_key(&(0x7f0000000300)='asymmetric\x00', &(0x7f00000003c0), &(0x7f0000000400)='syzkaller\x00', 0xfffffffffffffffe) keyctl$get_security(0x11, 0x0, &(0x7f0000000440)=""/34, 0x22) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000480)) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") add_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffffa) keyctl$invalidate(0x15, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200), 0x4) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000580)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 10:20:52 executing program 5: sysinfo(&(0x7f0000000380)=""/4096) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000280)=""/212, &(0x7f0000001380)=0xd4) pipe(&(0x7f0000000040)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000140)) getresuid(&(0x7f00000014c0), &(0x7f0000001500), &(0x7f0000001540)) getresuid(&(0x7f0000001580), &(0x7f00000015c0), &(0x7f0000001600)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001640)={{{@in6=@local, @in6}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001740)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001880)=0xe8) getegid() getgroups(0x0, &(0x7f00000018c0)) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 10:20:52 executing program 0: eventfd(0x0) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) request_key(&(0x7f0000000300)='asymmetric\x00', &(0x7f00000003c0), &(0x7f0000000400)='syzkaller\x00', 0xfffffffffffffffe) keyctl$get_security(0x11, 0x0, &(0x7f0000000440)=""/34, 0x22) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000480)) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") add_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffffa) keyctl$invalidate(0x15, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200), 0x4) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000580)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 10:20:52 executing program 1: getrusage(0x1, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@dev, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000004240)='systemselinuxvboxnet0\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000042c0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000043c0)=0xe8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000140)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14}, 0x14}}, 0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f00000056c0), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) getpid() inotify_init() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@remote, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 10:20:52 executing program 0: eventfd(0x0) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) request_key(&(0x7f0000000300)='asymmetric\x00', &(0x7f00000003c0), &(0x7f0000000400)='syzkaller\x00', 0xfffffffffffffffe) keyctl$get_security(0x11, 0x0, &(0x7f0000000440)=""/34, 0x22) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000480)) syz_execute_func(&(0x7f0000000340)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") add_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffffa) keyctl$invalidate(0x15, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200), 0x4) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000580)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 10:20:53 executing program 2: utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000700), 0x0, 0x0, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=ANY=[], &(0x7f0000000180)='keyring\x00', 0x8, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/context\x00', 0x2, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000001c0)={'syzkaller0\x00', @ifru_flags}) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3, 0x29e) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) mmap(&(0x7f000053b000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f000053b000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f00000cc000/0x4000)=nil) mmap(&(0x7f0000000000/0xfd8000)=nil, 0xfd8000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000004c0)) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @dev}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) connect$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, 0x1c) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)='./file0\x00') sendto$inet6(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0, &(0x7f00000006c0)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(0xffffffffffffffff, &(0x7f0000000340)=@objname={'system_u:object_r:sshd_exec_t:s0', 0x20, '/usr/sbin/cupsd', 0x20, 0x0, 0x20, './file0\x00'}, 0x4e) sendmmsg(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) 10:20:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x10, &(0x7f0000258000)="17000000020001000003be8c5ee17688a3000008010100ec1fda1e0336030000000000000098fc5ad9485bbb6a8800000000dba67e0600000000000200df018000000000f5009cee4a5acb3da400001fb700670000c88ebbff0601150039010000000000000000000609edffffffffffff02df9eebe7ec7ee87cccebf6ba000840024f0298e9e90554062a80e605007f71174aa9512cbf320ec39f02d47c59cc16268b6026eb4bf6ba2112ce68bf17a6e019b7487067c12f", 0xb8) 10:20:53 executing program 0: add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080), &(0x7f0000000140)="8f", 0x1, 0xfffffffffffffffe) socket$inet_icmp_raw(0x2, 0x3, 0x1) getpeername$inet(0xffffffffffffffff, &(0x7f0000004080)={0x2, 0x0, @multicast2}, &(0x7f00000041c0)=0x10) geteuid() getresgid(&(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)) keyctl$chown(0x4, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffffa) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a80)={@local, @loopback}, 0xc) socket$inet_udp(0x2, 0x2, 0x0) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") clock_gettime(0x0, &(0x7f0000003f80)) recvmmsg(0xffffffffffffff9c, &(0x7f0000003e00), 0x0, 0x0, &(0x7f0000003fc0)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000040c0)={'gre0\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000001c0)="cf045c5804b5901205a49b613a3b4af3", 0x10) set_tid_address(&(0x7f0000000380)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000003c0)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @dev}}) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000cc0)=ANY=[], 0x0) write$nbd(0xffffffffffffffff, &(0x7f00000042c0)=ANY=[], 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000004100), 0x88) sendto$inet(0xffffffffffffffff, &(0x7f0000000ac0), 0x0, 0x0, &(0x7f0000000bc0)={0x2, 0x0, @local}, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x14) add_key(&(0x7f0000004200)='keyring\x00', &(0x7f0000004240), &(0x7f0000004280), 0x0, 0xfffffffffffffffb) keyctl$link(0x8, 0x0, 0x0) 10:20:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x10, &(0x7f0000258000)="17000000020001000003be8c5ee17688a3000008010100ec1fda1e0336030000000000000098fc5ad9485bbb6a8800000000dba67e0600000000000200df018000000000f5009cee4a5acb3da400001fb700670000c88ebbff0601150039010000000000000000000609edffffffffffff02df9eebe7ec7ee87cccebf6ba000840024f0298e9e90554062a80e605007f71174aa9512cbf320ec39f02d47c59cc16268b6026eb4bf6ba2112ce68bf17a6e019b7487067c12f", 0xb8) 10:20:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x10, &(0x7f0000258000)="17000000020001000003be8c5ee17688a3000008010100ec1fda1e0336030000000000000098fc5ad9485bbb6a8800000000dba67e0600000000000200df018000000000f5009cee4a5acb3da400001fb700670000c88ebbff0601150039010000000000000000000609edffffffffffff02df9eebe7ec7ee87cccebf6ba000840024f0298e9e90554062a80e605007f71174aa9512cbf320ec39f02d47c59cc16268b6026eb4bf6ba2112ce68bf17a6e019b7487067c12f", 0xb8) 10:20:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x10, &(0x7f0000258000)="17000000020001000003be8c5ee17688a3000008010100ec1fda1e0336030000000000000098fc5ad9485bbb6a8800000000dba67e0600000000000200df018000000000f5009cee4a5acb3da400001fb700670000c88ebbff0601150039010000000000000000000609edffffffffffff02df9eebe7ec7ee87cccebf6ba000840024f0298e9e90554062a80e605007f71174aa9512cbf320ec39f02d47c59cc16268b6026eb4bf6ba2112ce68bf17a6e019b7487067c12f", 0xb8) 10:20:53 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000180)) pipe2(&(0x7f0000000040), 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0b66969ef69b0dede41ffaa322333334e41ff0f18373766460f3828523044c1b086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d5064ac1ef2832433ae5da314b706e298987b7f") setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0), 0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f00000002c0)}, 0x10) fchmod(0xffffffffffffffff, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000080)) 10:20:53 executing program 3: dup(0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000005c0)=""/4096, 0x1000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @dev}, &(0x7f0000000400)=0x10) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0xfffffffffffffffe, 0x0) splice(0xffffffffffffffff, &(0x7f0000000240), 0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000300)=@hci, &(0x7f0000000380)=0x80) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000480)=0xc) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000015c0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@remote}}, 0xe8) clock_adjtime(0x0, &(0x7f00000004c0)) dup(0xffffffffffffff9c) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000080)) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000180)=""/24) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) shutdown(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 10:20:53 executing program 5: sysinfo(&(0x7f0000000380)=""/4096) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000280)=""/212, &(0x7f0000001380)=0xd4) pipe(&(0x7f0000000040)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000140)) getresuid(&(0x7f00000014c0), &(0x7f0000001500), &(0x7f0000001540)) getresuid(&(0x7f0000001580), &(0x7f00000015c0), &(0x7f0000001600)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001640)={{{@in6=@local, @in6}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000001740)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@local, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000001880)=0xe8) getegid() getgroups(0x0, &(0x7f00000018c0)) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 10:20:53 executing program 1: getrusage(0x1, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@dev, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000004240)='systemselinuxvboxnet0\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000042c0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000043c0)=0xe8) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000140)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14}, 0x14}}, 0x0) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmmsg(0xffffffffffffffff, &(0x7f00000056c0), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) getpid() inotify_init() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@remote, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 10:20:53 executing program 2: utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000700), 0x0, 0x0, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=ANY=[], &(0x7f0000000180)='keyring\x00', 0x8, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/context\x00', 0x2, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000001c0)={'syzkaller0\x00', @ifru_flags}) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3, 0x29e) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) mmap(&(0x7f000053b000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f000053b000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f00000cc000/0x4000)=nil) mmap(&(0x7f0000000000/0xfd8000)=nil, 0xfd8000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000004c0)) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @dev}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) connect$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, 0x1c) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)='./file0\x00') sendto$inet6(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0, &(0x7f00000006c0)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(0xffffffffffffffff, &(0x7f0000000340)=@objname={'system_u:object_r:sshd_exec_t:s0', 0x20, '/usr/sbin/cupsd', 0x20, 0x0, 0x20, './file0\x00'}, 0x4e) sendmmsg(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) 10:20:54 executing program 0: add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080), &(0x7f0000000140)="8f", 0x1, 0xfffffffffffffffe) socket$inet_icmp_raw(0x2, 0x3, 0x1) getpeername$inet(0xffffffffffffffff, &(0x7f0000004080)={0x2, 0x0, @multicast2}, &(0x7f00000041c0)=0x10) geteuid() getresgid(&(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)) keyctl$chown(0x4, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffffa) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a80)={@local, @loopback}, 0xc) socket$inet_udp(0x2, 0x2, 0x0) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") clock_gettime(0x0, &(0x7f0000003f80)) recvmmsg(0xffffffffffffff9c, &(0x7f0000003e00), 0x0, 0x0, &(0x7f0000003fc0)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000040c0)={'gre0\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000001c0)="cf045c5804b5901205a49b613a3b4af3", 0x10) set_tid_address(&(0x7f0000000380)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000003c0)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @dev}}) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000cc0)=ANY=[], 0x0) write$nbd(0xffffffffffffffff, &(0x7f00000042c0)=ANY=[], 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000004100), 0x88) sendto$inet(0xffffffffffffffff, &(0x7f0000000ac0), 0x0, 0x0, &(0x7f0000000bc0)={0x2, 0x0, @local}, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x14) add_key(&(0x7f0000004200)='keyring\x00', &(0x7f0000004240), &(0x7f0000004280), 0x0, 0xfffffffffffffffb) keyctl$link(0x8, 0x0, 0x0) 10:20:54 executing program 3: dup(0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000005c0)=""/4096, 0x1000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @dev}, &(0x7f0000000400)=0x10) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0xfffffffffffffffe, 0x0) splice(0xffffffffffffffff, &(0x7f0000000240), 0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000300)=@hci, &(0x7f0000000380)=0x80) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000480)=0xc) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000015c0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@remote}}, 0xe8) clock_adjtime(0x0, &(0x7f00000004c0)) dup(0xffffffffffffff9c) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000080)) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000180)=""/24) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) shutdown(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 10:20:54 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000180)) pipe2(&(0x7f0000000040), 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0b66969ef69b0dede41ffaa322333334e41ff0f18373766460f3828523044c1b086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d5064ac1ef2832433ae5da314b706e298987b7f") setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0), 0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f00000002c0)}, 0x10) fchmod(0xffffffffffffffff, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000080)) 10:20:54 executing program 5: unshare(0x8000003) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000012ac0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000106c0)) getitimer(0x0, &(0x7f0000000240)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)=""/195, &(0x7f00000002c0)=0xfffffffffffffef2) creat(&(0x7f0000000080)='./file0\x00', 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000003c0), &(0x7f0000000300)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="42805da0bd0fef69dc0f01eece6dfa19fa380f38218f8978972bf0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac46279db67444472e671fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000007c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000880)={{{@in6, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@broadcast, @in=@loopback}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'bpq0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000cc0)={{{@in=@multicast2, @in=@local}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000400)=0x7c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6=@loopback, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in=@rand_addr, @in6}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000003180)={@dev}, &(0x7f00000031c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000032c0)={{{@in=@multicast2, @in=@local}}, {{@in=@local}}}, &(0x7f00000033c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003400)={{{@in6=@ipv4={[], [], @multicast2}, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000003500)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003540)={{{@in6=@ipv4={[], [], @remote}, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000003640)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003680)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003700)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000037c0)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003800)={'bridge_slave_1\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003840)={0x0, @dev, @dev}, &(0x7f0000003880)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003940)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003980)={@mcast1}, &(0x7f00000039c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003b40)={{{@in, @in6=@mcast1}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000003c40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003cc0)={0x0, @local, @local}, &(0x7f0000003d00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003d40)={{{@in=@remote, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000003e40)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000003e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003ec0)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000004000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004040)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000004080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000040c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004100)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000004140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004180)=0x14) 10:20:54 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000200)) 10:20:54 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000200)) 10:20:54 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000200)) 10:20:54 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000200)) 10:20:54 executing program 2: utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000700), 0x0, 0x0, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=ANY=[], &(0x7f0000000180)='keyring\x00', 0x8, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/context\x00', 0x2, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000001c0)={'syzkaller0\x00', @ifru_flags}) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3, 0x29e) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) mmap(&(0x7f000053b000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f000053b000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f00000cc000/0x4000)=nil) mmap(&(0x7f0000000000/0xfd8000)=nil, 0xfd8000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000004c0)) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @dev}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) connect$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, 0x1c) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)='./file0\x00') sendto$inet6(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0, &(0x7f00000006c0)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(0xffffffffffffffff, &(0x7f0000000340)=@objname={'system_u:object_r:sshd_exec_t:s0', 0x20, '/usr/sbin/cupsd', 0x20, 0x0, 0x20, './file0\x00'}, 0x4e) sendmmsg(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) 10:20:54 executing program 1: clock_gettime(0x0, &(0x7f0000000500)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e40)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000023c0)) lstat(&(0x7f0000002400)='./file0/file0\x00', &(0x7f0000002440)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002500)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f00000024c0)='systemem0user&vboxnet0\x00', 0xffffffffffffffff}, 0x30) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002580), &(0x7f00000025c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002680)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002a80)) getgroups(0x0, &(0x7f0000002ac0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002b00)) stat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c00)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002c40)) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004480)) getgid() getresgid(&(0x7f00000046c0), &(0x7f0000004700), &(0x7f0000004740)) fcntl$getown(0xffffffffffffffff, 0x9) getgroups(0x0, &(0x7f0000004780)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005c00)) lstat(&(0x7f0000005c40)='./file1\x00', &(0x7f0000005c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005d00), &(0x7f0000005d40)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000005d80)) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005e80), 0x0, 0x0) add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) keyctl$unlink(0x9, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000200)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000480)) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 10:20:55 executing program 0: add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080), &(0x7f0000000140)="8f", 0x1, 0xfffffffffffffffe) socket$inet_icmp_raw(0x2, 0x3, 0x1) getpeername$inet(0xffffffffffffffff, &(0x7f0000004080)={0x2, 0x0, @multicast2}, &(0x7f00000041c0)=0x10) geteuid() getresgid(&(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)) keyctl$chown(0x4, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffffa) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a80)={@local, @loopback}, 0xc) socket$inet_udp(0x2, 0x2, 0x0) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") clock_gettime(0x0, &(0x7f0000003f80)) recvmmsg(0xffffffffffffff9c, &(0x7f0000003e00), 0x0, 0x0, &(0x7f0000003fc0)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000040c0)={'gre0\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000001c0)="cf045c5804b5901205a49b613a3b4af3", 0x10) set_tid_address(&(0x7f0000000380)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000003c0)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @dev}}) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000cc0)=ANY=[], 0x0) write$nbd(0xffffffffffffffff, &(0x7f00000042c0)=ANY=[], 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000004100), 0x88) sendto$inet(0xffffffffffffffff, &(0x7f0000000ac0), 0x0, 0x0, &(0x7f0000000bc0)={0x2, 0x0, @local}, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x14) add_key(&(0x7f0000004200)='keyring\x00', &(0x7f0000004240), &(0x7f0000004280), 0x0, 0xfffffffffffffffb) keyctl$link(0x8, 0x0, 0x0) 10:20:55 executing program 3: dup(0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000005c0)=""/4096, 0x1000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @dev}, &(0x7f0000000400)=0x10) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0xfffffffffffffffe, 0x0) splice(0xffffffffffffffff, &(0x7f0000000240), 0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000300)=@hci, &(0x7f0000000380)=0x80) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000480)=0xc) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000015c0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@remote}}, 0xe8) clock_adjtime(0x0, &(0x7f00000004c0)) dup(0xffffffffffffff9c) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000080)) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000180)=""/24) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) shutdown(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 10:20:55 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000180)) pipe2(&(0x7f0000000040), 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0b66969ef69b0dede41ffaa322333334e41ff0f18373766460f3828523044c1b086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d5064ac1ef2832433ae5da314b706e298987b7f") setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0), 0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f00000002c0)}, 0x10) fchmod(0xffffffffffffffff, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000080)) 10:20:55 executing program 5: unshare(0x8000003) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000012ac0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000106c0)) getitimer(0x0, &(0x7f0000000240)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)=""/195, &(0x7f00000002c0)=0xfffffffffffffef2) creat(&(0x7f0000000080)='./file0\x00', 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000003c0), &(0x7f0000000300)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="42805da0bd0fef69dc0f01eece6dfa19fa380f38218f8978972bf0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac46279db67444472e671fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000007c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000880)={{{@in6, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@broadcast, @in=@loopback}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'bpq0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000cc0)={{{@in=@multicast2, @in=@local}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000400)=0x7c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6=@loopback, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in=@rand_addr, @in6}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000003180)={@dev}, &(0x7f00000031c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000032c0)={{{@in=@multicast2, @in=@local}}, {{@in=@local}}}, &(0x7f00000033c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003400)={{{@in6=@ipv4={[], [], @multicast2}, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000003500)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003540)={{{@in6=@ipv4={[], [], @remote}, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000003640)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003680)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003700)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000037c0)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003800)={'bridge_slave_1\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003840)={0x0, @dev, @dev}, &(0x7f0000003880)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003940)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003980)={@mcast1}, &(0x7f00000039c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003b40)={{{@in, @in6=@mcast1}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000003c40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003cc0)={0x0, @local, @local}, &(0x7f0000003d00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003d40)={{{@in=@remote, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000003e40)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000003e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003ec0)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000004000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004040)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000004080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000040c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004100)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000004140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004180)=0x14) 10:20:55 executing program 2: utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000700), 0x0, 0x0, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=ANY=[], &(0x7f0000000180)='keyring\x00', 0x8, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/context\x00', 0x2, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000001c0)={'syzkaller0\x00', @ifru_flags}) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3, 0x29e) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)) mmap(&(0x7f000053b000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f000053b000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f00000cc000/0x4000)=nil) mmap(&(0x7f0000000000/0xfd8000)=nil, 0xfd8000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000004c0)) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @dev}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) connect$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast1}, 0x1c) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)='./file0\x00') sendto$inet6(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0, &(0x7f00000006c0)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(0xffffffffffffffff, &(0x7f0000000340)=@objname={'system_u:object_r:sshd_exec_t:s0', 0x20, '/usr/sbin/cupsd', 0x20, 0x0, 0x20, './file0\x00'}, 0x4e) sendmmsg(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) 10:20:55 executing program 1: clock_gettime(0x0, &(0x7f0000000500)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e40)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000023c0)) lstat(&(0x7f0000002400)='./file0/file0\x00', &(0x7f0000002440)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002500)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f00000024c0)='systemem0user&vboxnet0\x00', 0xffffffffffffffff}, 0x30) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002580), &(0x7f00000025c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002680)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002a80)) getgroups(0x0, &(0x7f0000002ac0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002b00)) stat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c00)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002c40)) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004480)) getgid() getresgid(&(0x7f00000046c0), &(0x7f0000004700), &(0x7f0000004740)) fcntl$getown(0xffffffffffffffff, 0x9) getgroups(0x0, &(0x7f0000004780)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005c00)) lstat(&(0x7f0000005c40)='./file1\x00', &(0x7f0000005c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005d00), &(0x7f0000005d40)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000005d80)) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005e80), 0x0, 0x0) add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) keyctl$unlink(0x9, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000200)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000480)) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 10:20:55 executing program 0: add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080), &(0x7f0000000140)="8f", 0x1, 0xfffffffffffffffe) socket$inet_icmp_raw(0x2, 0x3, 0x1) getpeername$inet(0xffffffffffffffff, &(0x7f0000004080)={0x2, 0x0, @multicast2}, &(0x7f00000041c0)=0x10) geteuid() getresgid(&(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)) keyctl$chown(0x4, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffffa) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a80)={@local, @loopback}, 0xc) socket$inet_udp(0x2, 0x2, 0x0) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") clock_gettime(0x0, &(0x7f0000003f80)) recvmmsg(0xffffffffffffff9c, &(0x7f0000003e00), 0x0, 0x0, &(0x7f0000003fc0)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000040c0)={'gre0\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000001c0)="cf045c5804b5901205a49b613a3b4af3", 0x10) set_tid_address(&(0x7f0000000380)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000003c0)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @dev}}) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000cc0)=ANY=[], 0x0) write$nbd(0xffffffffffffffff, &(0x7f00000042c0)=ANY=[], 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000004100), 0x88) sendto$inet(0xffffffffffffffff, &(0x7f0000000ac0), 0x0, 0x0, &(0x7f0000000bc0)={0x2, 0x0, @local}, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x14) add_key(&(0x7f0000004200)='keyring\x00', &(0x7f0000004240), &(0x7f0000004280), 0x0, 0xfffffffffffffffb) keyctl$link(0x8, 0x0, 0x0) 10:20:56 executing program 3: dup(0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000005c0)=""/4096, 0x1000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @dev}, &(0x7f0000000400)=0x10) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0xfffffffffffffffe, 0x0) splice(0xffffffffffffffff, &(0x7f0000000240), 0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000300)=@hci, &(0x7f0000000380)=0x80) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000480)=0xc) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000015c0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@remote}}, 0xe8) clock_adjtime(0x0, &(0x7f00000004c0)) dup(0xffffffffffffff9c) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000080)) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000180)=""/24) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) shutdown(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 10:20:56 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000180)) pipe2(&(0x7f0000000040), 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0b66969ef69b0dede41ffaa322333334e41ff0f18373766460f3828523044c1b086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d5064ac1ef2832433ae5da314b706e298987b7f") setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0), 0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f00000002c0)}, 0x10) fchmod(0xffffffffffffffff, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000080)) 10:20:56 executing program 5: unshare(0x8000003) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000012ac0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000106c0)) getitimer(0x0, &(0x7f0000000240)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)=""/195, &(0x7f00000002c0)=0xfffffffffffffef2) creat(&(0x7f0000000080)='./file0\x00', 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000003c0), &(0x7f0000000300)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="42805da0bd0fef69dc0f01eece6dfa19fa380f38218f8978972bf0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac46279db67444472e671fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000007c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000880)={{{@in6, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@broadcast, @in=@loopback}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'bpq0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000cc0)={{{@in=@multicast2, @in=@local}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000400)=0x7c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6=@loopback, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in=@rand_addr, @in6}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000003180)={@dev}, &(0x7f00000031c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000032c0)={{{@in=@multicast2, @in=@local}}, {{@in=@local}}}, &(0x7f00000033c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003400)={{{@in6=@ipv4={[], [], @multicast2}, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000003500)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003540)={{{@in6=@ipv4={[], [], @remote}, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000003640)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003680)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003700)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000037c0)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003800)={'bridge_slave_1\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003840)={0x0, @dev, @dev}, &(0x7f0000003880)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003940)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003980)={@mcast1}, &(0x7f00000039c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003b40)={{{@in, @in6=@mcast1}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000003c40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003cc0)={0x0, @local, @local}, &(0x7f0000003d00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003d40)={{{@in=@remote, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000003e40)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000003e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003ec0)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000004000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004040)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000004080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000040c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004100)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000004140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004180)=0x14) 10:20:56 executing program 2: clock_gettime(0x0, &(0x7f0000000500)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e40)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000023c0)) lstat(&(0x7f0000002400)='./file0/file0\x00', &(0x7f0000002440)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002500)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f00000024c0)='systemem0user&vboxnet0\x00', 0xffffffffffffffff}, 0x30) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002580), &(0x7f00000025c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002680)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002a80)) getgroups(0x0, &(0x7f0000002ac0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002b00)) stat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c00)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002c40)) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004480)) getgid() getresgid(&(0x7f00000046c0), &(0x7f0000004700), &(0x7f0000004740)) fcntl$getown(0xffffffffffffffff, 0x9) getgroups(0x0, &(0x7f0000004780)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005c00)) lstat(&(0x7f0000005c40)='./file1\x00', &(0x7f0000005c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005d00), &(0x7f0000005d40)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000005d80)) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005e80), 0x0, 0x0) add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) keyctl$unlink(0x9, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000200)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000480)) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 10:20:56 executing program 1: clock_gettime(0x0, &(0x7f0000000500)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e40)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000023c0)) lstat(&(0x7f0000002400)='./file0/file0\x00', &(0x7f0000002440)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002500)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f00000024c0)='systemem0user&vboxnet0\x00', 0xffffffffffffffff}, 0x30) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002580), &(0x7f00000025c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002680)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002a80)) getgroups(0x0, &(0x7f0000002ac0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002b00)) stat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c00)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002c40)) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004480)) getgid() getresgid(&(0x7f00000046c0), &(0x7f0000004700), &(0x7f0000004740)) fcntl$getown(0xffffffffffffffff, 0x9) getgroups(0x0, &(0x7f0000004780)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005c00)) lstat(&(0x7f0000005c40)='./file1\x00', &(0x7f0000005c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005d00), &(0x7f0000005d40)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000005d80)) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005e80), 0x0, 0x0) add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) keyctl$unlink(0x9, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000200)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000480)) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 10:20:56 executing program 0: prctl$seccomp(0x23, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000280)={'tunl0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[]}}, 0x0) mlock2(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$urandom(0xffffffffffffff9c, &(0x7f0000000380)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000340)={@ipv4={[], [], @remote}}, 0x14) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 10:20:56 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x1002000, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000000c0)="604befb6ff0ea3a2cd23ed66acd7496446e26c3c1dd5c54fe858aa06fff7bf31d7ccd9f2475d59dab1e416b6c6de4f8dce09dc2cf328655fb8387577c2e4ef38a615dfd812cafef2b23d04d3955f898702803e8d2b4d25b26cb2bc676d34cfab11ef4304b4e69045733771df7e1cc3f6563a1ae2d0d718c78ce95f", 0x7b, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000340)='/dev/net/tun\x00', 0xfffffffffffffffd) keyctl$instantiate(0xc, r1, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574001e00000000000000bd6800", 0x43732e5398416f1a}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x80000000000e, 0x4, 0x2000000000004, 0x200001006f}, 0x2c) close(r0) 10:20:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket(0x10, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000240001000000000000000000000000", @ANYRES64=r0], 0x2}, 0x1, 0x0, 0x0, 0x24004810}, 0x0) 10:20:56 executing program 5: unshare(0x8000003) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000012ac0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000106c0)) getitimer(0x0, &(0x7f0000000240)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)=""/195, &(0x7f00000002c0)=0xfffffffffffffef2) creat(&(0x7f0000000080)='./file0\x00', 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000003c0), &(0x7f0000000300)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="42805da0bd0fef69dc0f01eece6dfa19fa380f38218f8978972bf0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac46279db67444472e671fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000007c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000880)={{{@in6, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@broadcast, @in=@loopback}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'bpq0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000cc0)={{{@in=@multicast2, @in=@local}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000400)=0x7c) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6=@loopback, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in=@rand_addr, @in6}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000003180)={@dev}, &(0x7f00000031c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000032c0)={{{@in=@multicast2, @in=@local}}, {{@in=@local}}}, &(0x7f00000033c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003400)={{{@in6=@ipv4={[], [], @multicast2}, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000003500)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003540)={{{@in6=@ipv4={[], [], @remote}, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000003640)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003680)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003700)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000037c0)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003800)={'bridge_slave_1\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003840)={0x0, @dev, @dev}, &(0x7f0000003880)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003940)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003980)={@mcast1}, &(0x7f00000039c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003b40)={{{@in, @in6=@mcast1}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000003c40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003cc0)={0x0, @local, @local}, &(0x7f0000003d00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003d40)={{{@in=@remote, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000003e40)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000003e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003ec0)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000004000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004040)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000004080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000040c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004100)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000004140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004180)=0x14) 10:20:57 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x1002000, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000000c0)="604befb6ff0ea3a2cd23ed66acd7496446e26c3c1dd5c54fe858aa06fff7bf31d7ccd9f2475d59dab1e416b6c6de4f8dce09dc2cf328655fb8387577c2e4ef38a615dfd812cafef2b23d04d3955f898702803e8d2b4d25b26cb2bc676d34cfab11ef4304b4e69045733771df7e1cc3f6563a1ae2d0d718c78ce95f", 0x7b, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000340)='/dev/net/tun\x00', 0xfffffffffffffffd) keyctl$instantiate(0xc, r1, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574001e00000000000000bd6800", 0x43732e5398416f1a}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x80000000000e, 0x4, 0x2000000000004, 0x200001006f}, 0x2c) close(r0) 10:20:57 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x1002000, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000000c0)="604befb6ff0ea3a2cd23ed66acd7496446e26c3c1dd5c54fe858aa06fff7bf31d7ccd9f2475d59dab1e416b6c6de4f8dce09dc2cf328655fb8387577c2e4ef38a615dfd812cafef2b23d04d3955f898702803e8d2b4d25b26cb2bc676d34cfab11ef4304b4e69045733771df7e1cc3f6563a1ae2d0d718c78ce95f", 0x7b, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000340)='/dev/net/tun\x00', 0xfffffffffffffffd) keyctl$instantiate(0xc, r1, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574001e00000000000000bd6800", 0x43732e5398416f1a}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x80000000000e, 0x4, 0x2000000000004, 0x200001006f}, 0x2c) close(r0) 10:20:57 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x1002000, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000000c0)="604befb6ff0ea3a2cd23ed66acd7496446e26c3c1dd5c54fe858aa06fff7bf31d7ccd9f2475d59dab1e416b6c6de4f8dce09dc2cf328655fb8387577c2e4ef38a615dfd812cafef2b23d04d3955f898702803e8d2b4d25b26cb2bc676d34cfab11ef4304b4e69045733771df7e1cc3f6563a1ae2d0d718c78ce95f", 0x7b, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000340)='/dev/net/tun\x00', 0xfffffffffffffffd) keyctl$instantiate(0xc, r1, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574001e00000000000000bd6800", 0x43732e5398416f1a}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x80000000000e, 0x4, 0x2000000000004, 0x200001006f}, 0x2c) close(r0) 10:20:57 executing program 2: clock_gettime(0x0, &(0x7f0000000500)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e40)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000023c0)) lstat(&(0x7f0000002400)='./file0/file0\x00', &(0x7f0000002440)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002500)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f00000024c0)='systemem0user&vboxnet0\x00', 0xffffffffffffffff}, 0x30) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002580), &(0x7f00000025c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002680)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002a80)) getgroups(0x0, &(0x7f0000002ac0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002b00)) stat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c00)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002c40)) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004480)) getgid() getresgid(&(0x7f00000046c0), &(0x7f0000004700), &(0x7f0000004740)) fcntl$getown(0xffffffffffffffff, 0x9) getgroups(0x0, &(0x7f0000004780)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005c00)) lstat(&(0x7f0000005c40)='./file1\x00', &(0x7f0000005c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005d00), &(0x7f0000005d40)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000005d80)) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005e80), 0x0, 0x0) add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) keyctl$unlink(0x9, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000200)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000480)) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 10:20:57 executing program 1: clock_gettime(0x0, &(0x7f0000000500)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e40)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000023c0)) lstat(&(0x7f0000002400)='./file0/file0\x00', &(0x7f0000002440)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002500)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f00000024c0)='systemem0user&vboxnet0\x00', 0xffffffffffffffff}, 0x30) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002580), &(0x7f00000025c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002680)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002a80)) getgroups(0x0, &(0x7f0000002ac0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002b00)) stat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c00)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002c40)) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004480)) getgid() getresgid(&(0x7f00000046c0), &(0x7f0000004700), &(0x7f0000004740)) fcntl$getown(0xffffffffffffffff, 0x9) getgroups(0x0, &(0x7f0000004780)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005c00)) lstat(&(0x7f0000005c40)='./file1\x00', &(0x7f0000005c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005d00), &(0x7f0000005d40)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000005d80)) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005e80), 0x0, 0x0) add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) keyctl$unlink(0x9, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000200)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000480)) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 10:20:57 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x1002000, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000000c0)="604befb6ff0ea3a2cd23ed66acd7496446e26c3c1dd5c54fe858aa06fff7bf31d7ccd9f2475d59dab1e416b6c6de4f8dce09dc2cf328655fb8387577c2e4ef38a615dfd812cafef2b23d04d3955f898702803e8d2b4d25b26cb2bc676d34cfab11ef4304b4e69045733771df7e1cc3f6563a1ae2d0d718c78ce95f", 0x7b, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000340)='/dev/net/tun\x00', 0xfffffffffffffffd) keyctl$instantiate(0xc, r1, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574001e00000000000000bd6800", 0x43732e5398416f1a}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x80000000000e, 0x4, 0x2000000000004, 0x200001006f}, 0x2c) close(r0) 10:20:57 executing program 0: prctl$seccomp(0x23, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000280)={'tunl0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[]}}, 0x0) mlock2(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$urandom(0xffffffffffffff9c, &(0x7f0000000380)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000340)={@ipv4={[], [], @remote}}, 0x14) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 10:20:57 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x1002000, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000000c0)="604befb6ff0ea3a2cd23ed66acd7496446e26c3c1dd5c54fe858aa06fff7bf31d7ccd9f2475d59dab1e416b6c6de4f8dce09dc2cf328655fb8387577c2e4ef38a615dfd812cafef2b23d04d3955f898702803e8d2b4d25b26cb2bc676d34cfab11ef4304b4e69045733771df7e1cc3f6563a1ae2d0d718c78ce95f", 0x7b, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000340)='/dev/net/tun\x00', 0xfffffffffffffffd) keyctl$instantiate(0xc, r1, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574001e00000000000000bd6800", 0x43732e5398416f1a}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x80000000000e, 0x4, 0x2000000000004, 0x200001006f}, 0x2c) close(r0) 10:20:57 executing program 5: prctl$seccomp(0x23, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000280)={'tunl0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[]}}, 0x0) mlock2(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$urandom(0xffffffffffffff9c, &(0x7f0000000380)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000340)={@ipv4={[], [], @remote}}, 0x14) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 10:20:57 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x1002000, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000000c0)="604befb6ff0ea3a2cd23ed66acd7496446e26c3c1dd5c54fe858aa06fff7bf31d7ccd9f2475d59dab1e416b6c6de4f8dce09dc2cf328655fb8387577c2e4ef38a615dfd812cafef2b23d04d3955f898702803e8d2b4d25b26cb2bc676d34cfab11ef4304b4e69045733771df7e1cc3f6563a1ae2d0d718c78ce95f", 0x7b, 0xfffffffffffffffe) request_key(&(0x7f0000000240)='trusted\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000340)='/dev/net/tun\x00', 0xfffffffffffffffd) keyctl$instantiate(0xc, r1, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574001e00000000000000bd6800", 0x43732e5398416f1a}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x80000000000e, 0x4, 0x2000000000004, 0x200001006f}, 0x2c) close(r0) 10:20:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket(0x10, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000240001000000000000000000000000", @ANYRES64=r0], 0x2}, 0x1, 0x0, 0x0, 0x24004810}, 0x0) 10:20:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket(0x10, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000240001000000000000000000000000", @ANYRES64=r0], 0x2}, 0x1, 0x0, 0x0, 0x24004810}, 0x0) 10:20:58 executing program 2: clock_gettime(0x0, &(0x7f0000000500)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e40)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000023c0)) lstat(&(0x7f0000002400)='./file0/file0\x00', &(0x7f0000002440)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002500)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f00000024c0)='systemem0user&vboxnet0\x00', 0xffffffffffffffff}, 0x30) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002580), &(0x7f00000025c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002680)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002a80)) getgroups(0x0, &(0x7f0000002ac0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002b00)) stat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c00)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002c40)) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004480)) getgid() getresgid(&(0x7f00000046c0), &(0x7f0000004700), &(0x7f0000004740)) fcntl$getown(0xffffffffffffffff, 0x9) getgroups(0x0, &(0x7f0000004780)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005c00)) lstat(&(0x7f0000005c40)='./file1\x00', &(0x7f0000005c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005d00), &(0x7f0000005d40)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000005d80)) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005e80), 0x0, 0x0) add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) keyctl$unlink(0x9, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000200)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000480)) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 10:20:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket(0x10, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000240001000000000000000000000000", @ANYRES64=r0], 0x2}, 0x1, 0x0, 0x0, 0x24004810}, 0x0) 10:20:58 executing program 0: prctl$seccomp(0x23, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000280)={'tunl0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[]}}, 0x0) mlock2(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$urandom(0xffffffffffffff9c, &(0x7f0000000380)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000340)={@ipv4={[], [], @remote}}, 0x14) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 10:20:58 executing program 5: prctl$seccomp(0x23, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000280)={'tunl0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[]}}, 0x0) mlock2(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$urandom(0xffffffffffffff9c, &(0x7f0000000380)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000340)={@ipv4={[], [], @remote}}, 0x14) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 10:20:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket(0x10, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000240001000000000000000000000000", @ANYRES64=r0], 0x2}, 0x1, 0x0, 0x0, 0x24004810}, 0x0) 10:20:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket(0x10, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000240001000000000000000000000000", @ANYRES64=r0], 0x2}, 0x1, 0x0, 0x0, 0x24004810}, 0x0) 10:20:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket(0x10, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000240001000000000000000000000000", @ANYRES64=r0], 0x2}, 0x1, 0x0, 0x0, 0x24004810}, 0x0) 10:20:59 executing program 0: prctl$seccomp(0x23, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000280)={'tunl0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[]}}, 0x0) mlock2(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$urandom(0xffffffffffffff9c, &(0x7f0000000380)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000340)={@ipv4={[], [], @remote}}, 0x14) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 10:20:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket(0x10, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000240001000000000000000000000000", @ANYRES64=r0], 0x2}, 0x1, 0x0, 0x0, 0x24004810}, 0x0) 10:20:59 executing program 5: prctl$seccomp(0x23, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000280)={'tunl0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[]}}, 0x0) mlock2(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$urandom(0xffffffffffffff9c, &(0x7f0000000380)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000340)={@ipv4={[], [], @remote}}, 0x14) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) 10:20:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket(0x10, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000240001000000000000000000000000", @ANYRES64=r0], 0x2}, 0x1, 0x0, 0x0, 0x24004810}, 0x0) 10:20:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket(0x10, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000240001000000000000000000000000", @ANYRES64=r0], 0x2}, 0x1, 0x0, 0x0, 0x24004810}, 0x0) 10:21:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket(0x10, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000240001000000000000000000000000", @ANYRES64=r0], 0x2}, 0x1, 0x0, 0x0, 0x24004810}, 0x0) 10:21:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket(0x10, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000240001000000000000000000000000", @ANYRES64=r0], 0x2}, 0x1, 0x0, 0x0, 0x24004810}, 0x0) 10:21:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket(0x10, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000240001000000000000000000000000", @ANYRES64=r0], 0x2}, 0x1, 0x0, 0x0, 0x24004810}, 0x0) 10:21:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket(0x10, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000240001000000000000000000000000", @ANYRES64=r0], 0x2}, 0x1, 0x0, 0x0, 0x24004810}, 0x0) 10:21:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket(0x10, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000240001000000000000000000000000", @ANYRES64=r0], 0x2}, 0x1, 0x0, 0x0, 0x24004810}, 0x0) 10:21:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket(0x10, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000240001000000000000000000000000", @ANYRES64=r0], 0x2}, 0x1, 0x0, 0x0, 0x24004810}, 0x0) 10:21:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket(0x10, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000240001000000000000000000000000", @ANYRES64=r0], 0x2}, 0x1, 0x0, 0x0, 0x24004810}, 0x0) 10:21:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket(0x10, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000240001000000000000000000000000", @ANYRES64=r0], 0x2}, 0x1, 0x0, 0x0, 0x24004810}, 0x0) 10:21:01 executing program 1: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000040)='\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000000), 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) chroot(&(0x7f0000000280)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000e40)='ppp1[\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) lstat(&(0x7f0000000f80)='./file0\x00', &(0x7f0000000fc0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002300)) lstat(&(0x7f0000002340)='./file0/file0\x00', &(0x7f0000002380)) stat(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440)) getpgid(0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000024c0), &(0x7f0000002500)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002540)={{{@in=@remote, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000002640)=0xe8) getgroups(0x0, &(0x7f0000002680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003880), &(0x7f00000038c0)=0xc) lstat(&(0x7f0000003900)='./file0\x00', &(0x7f0000003940)) fstat(0xffffffffffffffff, &(0x7f00000039c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a80), &(0x7f0000003ac0)=0xc) lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003c00), 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:21:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket(0x10, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000240001000000000000000000000000", @ANYRES64=r0], 0x2}, 0x1, 0x0, 0x0, 0x24004810}, 0x0) 10:21:01 executing program 1: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000040)='\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000000), 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) chroot(&(0x7f0000000280)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000e40)='ppp1[\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) lstat(&(0x7f0000000f80)='./file0\x00', &(0x7f0000000fc0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002300)) lstat(&(0x7f0000002340)='./file0/file0\x00', &(0x7f0000002380)) stat(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440)) getpgid(0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000024c0), &(0x7f0000002500)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002540)={{{@in=@remote, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000002640)=0xe8) getgroups(0x0, &(0x7f0000002680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003880), &(0x7f00000038c0)=0xc) lstat(&(0x7f0000003900)='./file0\x00', &(0x7f0000003940)) fstat(0xffffffffffffffff, &(0x7f00000039c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a80), &(0x7f0000003ac0)=0xc) lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003c00), 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:21:01 executing program 1: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000040)='\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000000), 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) chroot(&(0x7f0000000280)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000e40)='ppp1[\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) lstat(&(0x7f0000000f80)='./file0\x00', &(0x7f0000000fc0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002300)) lstat(&(0x7f0000002340)='./file0/file0\x00', &(0x7f0000002380)) stat(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440)) getpgid(0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000024c0), &(0x7f0000002500)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002540)={{{@in=@remote, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000002640)=0xe8) getgroups(0x0, &(0x7f0000002680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003880), &(0x7f00000038c0)=0xc) lstat(&(0x7f0000003900)='./file0\x00', &(0x7f0000003940)) fstat(0xffffffffffffffff, &(0x7f00000039c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a80), &(0x7f0000003ac0)=0xc) lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003c00), 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:21:01 executing program 1: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000040)='\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000000), 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) chroot(&(0x7f0000000280)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000e40)='ppp1[\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) lstat(&(0x7f0000000f80)='./file0\x00', &(0x7f0000000fc0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002300)) lstat(&(0x7f0000002340)='./file0/file0\x00', &(0x7f0000002380)) stat(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440)) getpgid(0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000024c0), &(0x7f0000002500)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002540)={{{@in=@remote, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000002640)=0xe8) getgroups(0x0, &(0x7f0000002680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003880), &(0x7f00000038c0)=0xc) lstat(&(0x7f0000003900)='./file0\x00', &(0x7f0000003940)) fstat(0xffffffffffffffff, &(0x7f00000039c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a80), &(0x7f0000003ac0)=0xc) lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003c00), 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:21:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f00000000c0)=""/232, &(0x7f0000000000)=0xe8) ioprio_set$pid(0x0, r1, 0x0) sched_getaffinity(r1, 0x8, &(0x7f0000000040)) 10:21:02 executing program 1: socket$packet(0x11, 0x2, 0x300) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000740)) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@loopback}}, {{}, 0x0, @in=@local}}, &(0x7f0000000440)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00'}) recvmmsg(0xffffffffffffff9c, &(0x7f0000002fc0), 0x0, 0x0, &(0x7f00000030c0)={0x0, 0x989680}) memfd_create(&(0x7f0000000040)='team0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@local, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0xe8) getsockname(0xffffffffffffff9c, &(0x7f0000003100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003180)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000031c0)={@loopback, @multicast2}, &(0x7f0000003200)=0xc) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003240)={0x0, @multicast2, @multicast1}, &(0x7f0000003280)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000032c0)={{{@in=@broadcast, @in=@local}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000033c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000003540)={'veth0_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000003640)={'team0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:21:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket(0x10, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000240001000000000000000000000000", @ANYRES64=r0], 0x2}, 0x1, 0x0, 0x0, 0x24004810}, 0x0) 10:21:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket(0x10, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000240001000000000000000000000000", @ANYRES64=r0], 0x2}, 0x1, 0x0, 0x0, 0x24004810}, 0x0) 10:21:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket(0x10, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000240001000000000000000000000000", @ANYRES64=r0], 0x2}, 0x1, 0x0, 0x0, 0x24004810}, 0x0) 10:21:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket(0x10, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000240001000000000000000000000000", @ANYRES64=r0], 0x2}, 0x1, 0x0, 0x0, 0x24004810}, 0x0) 10:21:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f00000000c0)=""/232, &(0x7f0000000000)=0xe8) ioprio_set$pid(0x0, r1, 0x0) sched_getaffinity(r1, 0x8, &(0x7f0000000040)) 10:21:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket(0x10, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000240001000000000000000000000000", @ANYRES64=r0], 0x2}, 0x1, 0x0, 0x0, 0x24004810}, 0x0) 10:21:03 executing program 1: socket$packet(0x11, 0x2, 0x300) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000740)) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@loopback}}, {{}, 0x0, @in=@local}}, &(0x7f0000000440)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00'}) recvmmsg(0xffffffffffffff9c, &(0x7f0000002fc0), 0x0, 0x0, &(0x7f00000030c0)={0x0, 0x989680}) memfd_create(&(0x7f0000000040)='team0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@local, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0xe8) getsockname(0xffffffffffffff9c, &(0x7f0000003100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003180)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000031c0)={@loopback, @multicast2}, &(0x7f0000003200)=0xc) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003240)={0x0, @multicast2, @multicast1}, &(0x7f0000003280)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000032c0)={{{@in=@broadcast, @in=@local}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000033c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000003540)={'veth0_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000003640)={'team0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:21:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640), 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socket(0x10, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="24000000240001000000000000000000000000", @ANYRES64=r0], 0x2}, 0x1, 0x0, 0x0, 0x24004810}, 0x0) 10:21:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f00000000c0)=""/232, &(0x7f0000000000)=0xe8) ioprio_set$pid(0x0, r1, 0x0) sched_getaffinity(r1, 0x8, &(0x7f0000000040)) 10:21:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f00000000c0)=""/232, &(0x7f0000000000)=0xe8) ioprio_set$pid(0x0, r1, 0x0) sched_getaffinity(r1, 0x8, &(0x7f0000000040)) 10:21:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f00000000c0)=""/232, &(0x7f0000000000)=0xe8) ioprio_set$pid(0x0, r1, 0x0) sched_getaffinity(r1, 0x8, &(0x7f0000000040)) 10:21:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f00000000c0)=""/232, &(0x7f0000000000)=0xe8) ioprio_set$pid(0x0, r1, 0x0) sched_getaffinity(r1, 0x8, &(0x7f0000000040)) 10:21:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f00000000c0)=""/232, &(0x7f0000000000)=0xe8) ioprio_set$pid(0x0, r1, 0x0) sched_getaffinity(r1, 0x8, &(0x7f0000000040)) 10:21:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f00000000c0)=""/232, &(0x7f0000000000)=0xe8) ioprio_set$pid(0x0, r1, 0x0) sched_getaffinity(r1, 0x8, &(0x7f0000000040)) 10:21:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f00000000c0)=""/232, &(0x7f0000000000)=0xe8) ioprio_set$pid(0x0, r1, 0x0) sched_getaffinity(r1, 0x8, &(0x7f0000000040)) 10:21:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f00000000c0)=""/232, &(0x7f0000000000)=0xe8) ioprio_set$pid(0x0, r1, 0x0) sched_getaffinity(r1, 0x8, &(0x7f0000000040)) 10:21:03 executing program 2: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000002c0)) clock_gettime(0x0, &(0x7f0000000300)) write$evdev(0xffffffffffffffff, &(0x7f0000000340), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000580)) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getegid() stat(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000700)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000780), 0x24, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cgroup.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:21:03 executing program 1: socket$packet(0x11, 0x2, 0x300) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000740)) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@loopback}}, {{}, 0x0, @in=@local}}, &(0x7f0000000440)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00'}) recvmmsg(0xffffffffffffff9c, &(0x7f0000002fc0), 0x0, 0x0, &(0x7f00000030c0)={0x0, 0x989680}) memfd_create(&(0x7f0000000040)='team0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@local, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0xe8) getsockname(0xffffffffffffff9c, &(0x7f0000003100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003180)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000031c0)={@loopback, @multicast2}, &(0x7f0000003200)=0xc) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003240)={0x0, @multicast2, @multicast1}, &(0x7f0000003280)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000032c0)={{{@in=@broadcast, @in=@local}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000033c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000003540)={'veth0_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000003640)={'team0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:21:03 executing program 3: mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x77359400}}, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) chdir(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f00000005c0)='asymmetric\x00', &(0x7f0000000600), &(0x7f0000000640)='mime_type\x00', 0xfffffffffffffffb) keyctl$clear(0x7, 0x0) syz_execute_func(&(0x7f00000019c0)="42805da0d1c4427d13380f01ee660f3a608600088041cb913591913d06290077b478993d233d23410feefa6b2179660f38302f660f3adf03cb2e470f9b243c40697907ffffffffc44379dfb9d6adbe90dfe2989f7f") 10:21:04 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000001c0)=@srh, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000200), 0x0) 10:21:04 executing program 5: getrusage(0x0, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) syz_open_dev$loop(&(0x7f0000000600)='/dev/loop#\x00', 0x0, 0x0) getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000001c00)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") keyctl$set_reqkey_keyring(0xa, 0x0) 10:21:04 executing program 2: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000002c0)) clock_gettime(0x0, &(0x7f0000000300)) write$evdev(0xffffffffffffffff, &(0x7f0000000340), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000580)) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getegid() stat(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000700)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000780), 0x24, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cgroup.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:21:04 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, &(0x7f00009d2000), 0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x90000019}) [ 409.715054] audit: type=1400 audit(1536920464.165:50): avc: denied { block_suspend } for pid=16478 comm="syz-executor4" capability=36 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 10:21:04 executing program 2: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000002c0)) clock_gettime(0x0, &(0x7f0000000300)) write$evdev(0xffffffffffffffff, &(0x7f0000000340), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000580)) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getegid() stat(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000700)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000780), 0x24, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cgroup.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:21:04 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, &(0x7f00009d2000), 0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x90000019}) 10:21:04 executing program 2: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000002c0)) clock_gettime(0x0, &(0x7f0000000300)) write$evdev(0xffffffffffffffff, &(0x7f0000000340), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000580)) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getegid() stat(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000700)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000780), 0x24, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cgroup.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:21:04 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, &(0x7f00009d2000), 0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x90000019}) 10:21:04 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000001c0)=@srh, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000200), 0x0) 10:21:04 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, &(0x7f00009d2000), 0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x90000019}) 10:21:04 executing program 1: socket$packet(0x11, 0x2, 0x300) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000740)) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@loopback}}, {{}, 0x0, @in=@local}}, &(0x7f0000000440)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00'}) recvmmsg(0xffffffffffffff9c, &(0x7f0000002fc0), 0x0, 0x0, &(0x7f00000030c0)={0x0, 0x989680}) memfd_create(&(0x7f0000000040)='team0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@local, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0xe8) getsockname(0xffffffffffffff9c, &(0x7f0000003100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003180)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000031c0)={@loopback, @multicast2}, &(0x7f0000003200)=0xc) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003240)={0x0, @multicast2, @multicast1}, &(0x7f0000003280)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000032c0)={{{@in=@broadcast, @in=@local}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000033c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000003540)={'veth0_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000003640)={'team0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:21:04 executing program 3: mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x77359400}}, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) chdir(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f00000005c0)='asymmetric\x00', &(0x7f0000000600), &(0x7f0000000640)='mime_type\x00', 0xfffffffffffffffb) keyctl$clear(0x7, 0x0) syz_execute_func(&(0x7f00000019c0)="42805da0d1c4427d13380f01ee660f3a608600088041cb913591913d06290077b478993d233d23410feefa6b2179660f38302f660f3adf03cb2e470f9b243c40697907ffffffffc44379dfb9d6adbe90dfe2989f7f") 10:21:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000001c0)=@srh, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000200), 0x0) 10:21:04 executing program 5: getrusage(0x0, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) syz_open_dev$loop(&(0x7f0000000600)='/dev/loop#\x00', 0x0, 0x0) getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000001c00)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") keyctl$set_reqkey_keyring(0xa, 0x0) 10:21:04 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000001c0)=@srh, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000200), 0x0) 10:21:04 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000001c0)=@srh, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000200), 0x0) 10:21:05 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000001c0)=@srh, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000200), 0x0) 10:21:05 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000001c0)=@srh, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000200), 0x0) 10:21:05 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000001c0)=@srh, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000200), 0x0) 10:21:05 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000001c0)=@srh, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000200), 0x0) 10:21:05 executing program 3: mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x77359400}}, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) chdir(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f00000005c0)='asymmetric\x00', &(0x7f0000000600), &(0x7f0000000640)='mime_type\x00', 0xfffffffffffffffb) keyctl$clear(0x7, 0x0) syz_execute_func(&(0x7f00000019c0)="42805da0d1c4427d13380f01ee660f3a608600088041cb913591913d06290077b478993d233d23410feefa6b2179660f38302f660f3adf03cb2e470f9b243c40697907ffffffffc44379dfb9d6adbe90dfe2989f7f") 10:21:05 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000001c0)=@srh, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000200), 0x0) 10:21:05 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000001c0)=@srh, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000200), 0x0) 10:21:05 executing program 5: getrusage(0x0, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) syz_open_dev$loop(&(0x7f0000000600)='/dev/loop#\x00', 0x0, 0x0) getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000001c00)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") keyctl$set_reqkey_keyring(0xa, 0x0) 10:21:05 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, &(0x7f00009d2000), 0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x90000019}) 10:21:05 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, &(0x7f00009d2000), 0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x90000019}) 10:21:05 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, &(0x7f00009d2000), 0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x90000019}) 10:21:06 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, &(0x7f00009d2000), 0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x90000019}) 10:21:06 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, &(0x7f00009d2000), 0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x90000019}) 10:21:06 executing program 4: ioprio_set$uid(0x2, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000280)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') keyctl$set_reqkey_keyring(0x4, 0x0) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x7, 0x0, {{0x7, ',vmnet0'}}}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:21:06 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000001c0)=@srh, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000200), 0x0) 10:21:06 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, &(0x7f00009d2000), 0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x90000019}) [ 411.784554] audit: type=1326 audit(1536920466.235:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=16586 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 10:21:06 executing program 3: mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x77359400}}, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) chdir(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f00000005c0)='asymmetric\x00', &(0x7f0000000600), &(0x7f0000000640)='mime_type\x00', 0xfffffffffffffffb) keyctl$clear(0x7, 0x0) syz_execute_func(&(0x7f00000019c0)="42805da0d1c4427d13380f01ee660f3a608600088041cb913591913d06290077b478993d233d23410feefa6b2179660f38302f660f3adf03cb2e470f9b243c40697907ffffffffc44379dfb9d6adbe90dfe2989f7f") 10:21:06 executing program 0: mlockall(0x0) socket$inet6(0xa, 0x0, 0x0) getpeername(0xffffffffffffff9c, &(0x7f0000000f80)=@can, &(0x7f0000001000)=0x80) open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001040)={'teql0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") accept(0xffffffffffffffff, &(0x7f0000000080)=@generic, &(0x7f0000000140)=0x80) syz_mount_image$vfat(&(0x7f00000001c0)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000800)) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 10:21:06 executing program 2: sched_getaffinity(0x0, 0x8, &(0x7f0000000380)) add_key(&(0x7f0000000200)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000000c0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000140)) tgkill(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000040)="42805da0124fef47dc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 10:21:06 executing program 5: getrusage(0x0, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) syz_open_dev$loop(&(0x7f0000000600)='/dev/loop#\x00', 0x0, 0x0) getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000001c00)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") keyctl$set_reqkey_keyring(0xa, 0x0) 10:21:06 executing program 4: ioprio_set$uid(0x2, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000280)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') keyctl$set_reqkey_keyring(0x4, 0x0) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x7, 0x0, {{0x7, ',vmnet0'}}}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:21:06 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000001c0)=@srh, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000200), 0x0) [ 412.264002] FAT-fs (loop0): bogus number of reserved sectors [ 412.281082] FAT-fs (loop0): Can't find a valid FAT filesystem [ 412.335212] audit: type=1326 audit(1536920466.785:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=16616 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 10:21:06 executing program 4: ioprio_set$uid(0x2, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000280)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') keyctl$set_reqkey_keyring(0x4, 0x0) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x7, 0x0, {{0x7, ',vmnet0'}}}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:21:07 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") [ 412.619699] audit: type=1326 audit(1536920467.065:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=16631 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 10:21:07 executing program 4: ioprio_set$uid(0x2, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000280)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') keyctl$set_reqkey_keyring(0x4, 0x0) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000480)={0x14, 0x7, 0x0, {{0x7, ',vmnet0'}}}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:21:07 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) socket$inet_tcp(0x2, 0x1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000001600), 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syncfs(0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000280)) prctl$setendian(0x14, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000080)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000200), 0x4) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) clock_adjtime(0x0, &(0x7f00000004c0)) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000600)={0x7}, 0x7) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 10:21:07 executing program 0: mlockall(0x0) socket$inet6(0xa, 0x0, 0x0) getpeername(0xffffffffffffff9c, &(0x7f0000000f80)=@can, &(0x7f0000001000)=0x80) open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001040)={'teql0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") accept(0xffffffffffffffff, &(0x7f0000000080)=@generic, &(0x7f0000000140)=0x80) syz_mount_image$vfat(&(0x7f00000001c0)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000800)) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 10:21:07 executing program 2: sched_getaffinity(0x0, 0x8, &(0x7f0000000380)) add_key(&(0x7f0000000200)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000000c0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000140)) tgkill(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000040)="42805da0124fef47dc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") [ 412.931986] audit: type=1326 audit(1536920467.385:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=16641 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 10:21:07 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x800000027, &(0x7f0000000000)={@multicast1, @local, @remote}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter\x00') setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)={@multicast1, @local, 0x0, 0x2, [@remote, @broadcast]}, 0x18) preadv(r1, &(0x7f0000000600), 0x1000000000000134, 0x10400002) 10:21:07 executing program 5: ioprio_set$uid(0x0, 0x0, 0x80003) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000780)) fstat(0xffffffffffffffff, &(0x7f00000003c0)) socket$inet_tcp(0x2, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000180)='./file0\x00'}, 0x10) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000280)) pwritev(0xffffffffffffffff, &(0x7f0000000ac0), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a00)) getpgid(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000c00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000c40)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002480), &(0x7f00000024c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 10:21:07 executing program 0: mlockall(0x0) socket$inet6(0xa, 0x0, 0x0) getpeername(0xffffffffffffff9c, &(0x7f0000000f80)=@can, &(0x7f0000001000)=0x80) open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001040)={'teql0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") accept(0xffffffffffffffff, &(0x7f0000000080)=@generic, &(0x7f0000000140)=0x80) syz_mount_image$vfat(&(0x7f00000001c0)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000800)) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 10:21:07 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x800000027, &(0x7f0000000000)={@multicast1, @local, @remote}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter\x00') setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)={@multicast1, @local, 0x0, 0x2, [@remote, @broadcast]}, 0x18) preadv(r1, &(0x7f0000000600), 0x1000000000000134, 0x10400002) 10:21:07 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x800000027, &(0x7f0000000000)={@multicast1, @local, @remote}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter\x00') setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)={@multicast1, @local, 0x0, 0x2, [@remote, @broadcast]}, 0x18) preadv(r1, &(0x7f0000000600), 0x1000000000000134, 0x10400002) 10:21:07 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x800000027, &(0x7f0000000000)={@multicast1, @local, @remote}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter\x00') setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)={@multicast1, @local, 0x0, 0x2, [@remote, @broadcast]}, 0x18) preadv(r1, &(0x7f0000000600), 0x1000000000000134, 0x10400002) 10:21:07 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x800000027, &(0x7f0000000000)={@multicast1, @local, @remote}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter\x00') setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)={@multicast1, @local, 0x0, 0x2, [@remote, @broadcast]}, 0x18) preadv(r1, &(0x7f0000000600), 0x1000000000000134, 0x10400002) [ 413.385454] FAT-fs (loop0): bogus number of reserved sectors [ 413.397234] FAT-fs (loop0): Can't find a valid FAT filesystem 10:21:07 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 10:21:07 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x800000027, &(0x7f0000000000)={@multicast1, @local, @remote}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter\x00') setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)={@multicast1, @local, 0x0, 0x2, [@remote, @broadcast]}, 0x18) preadv(r1, &(0x7f0000000600), 0x1000000000000134, 0x10400002) 10:21:08 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) socket$inet_tcp(0x2, 0x1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000001600), 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syncfs(0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000280)) prctl$setendian(0x14, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000080)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000200), 0x4) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) clock_adjtime(0x0, &(0x7f00000004c0)) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000600)={0x7}, 0x7) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 10:21:08 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x800000027, &(0x7f0000000000)={@multicast1, @local, @remote}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter\x00') setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)={@multicast1, @local, 0x0, 0x2, [@remote, @broadcast]}, 0x18) preadv(r1, &(0x7f0000000600), 0x1000000000000134, 0x10400002) 10:21:08 executing program 2: sched_getaffinity(0x0, 0x8, &(0x7f0000000380)) add_key(&(0x7f0000000200)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000000c0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000140)) tgkill(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000040)="42805da0124fef47dc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 10:21:08 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) socket$inet_tcp(0x2, 0x1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000001600), 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syncfs(0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000280)) prctl$setendian(0x14, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000080)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000200), 0x4) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) clock_adjtime(0x0, &(0x7f00000004c0)) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000600)={0x7}, 0x7) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 10:21:08 executing program 5: ioprio_set$uid(0x0, 0x0, 0x80003) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000780)) fstat(0xffffffffffffffff, &(0x7f00000003c0)) socket$inet_tcp(0x2, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000180)='./file0\x00'}, 0x10) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000280)) pwritev(0xffffffffffffffff, &(0x7f0000000ac0), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a00)) getpgid(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000c00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000c40)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002480), &(0x7f00000024c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 10:21:08 executing program 0: mlockall(0x0) socket$inet6(0xa, 0x0, 0x0) getpeername(0xffffffffffffff9c, &(0x7f0000000f80)=@can, &(0x7f0000001000)=0x80) open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001040)={'teql0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") accept(0xffffffffffffffff, &(0x7f0000000080)=@generic, &(0x7f0000000140)=0x80) syz_mount_image$vfat(&(0x7f00000001c0)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000800)) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 414.225417] FAT-fs (loop0): bogus number of reserved sectors [ 414.235923] FAT-fs (loop0): Can't find a valid FAT filesystem 10:21:08 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 10:21:09 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) socket$inet_tcp(0x2, 0x1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000001600), 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syncfs(0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000280)) prctl$setendian(0x14, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000080)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000200), 0x4) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) clock_adjtime(0x0, &(0x7f00000004c0)) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000600)={0x7}, 0x7) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 10:21:09 executing program 2: sched_getaffinity(0x0, 0x8, &(0x7f0000000380)) add_key(&(0x7f0000000200)='id_legacy\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000000c0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000140)) tgkill(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000040)="42805da0124fef47dc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 10:21:09 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) socket$inet_tcp(0x2, 0x1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000001600), 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syncfs(0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000280)) prctl$setendian(0x14, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000080)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000200), 0x4) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) clock_adjtime(0x0, &(0x7f00000004c0)) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000600)={0x7}, 0x7) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 10:21:09 executing program 5: ioprio_set$uid(0x0, 0x0, 0x80003) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000780)) fstat(0xffffffffffffffff, &(0x7f00000003c0)) socket$inet_tcp(0x2, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000180)='./file0\x00'}, 0x10) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000280)) pwritev(0xffffffffffffffff, &(0x7f0000000ac0), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a00)) getpgid(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000c00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000c40)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002480), &(0x7f00000024c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 10:21:09 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 10:21:09 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 10:21:09 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) socket$inet_tcp(0x2, 0x1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000001600), 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syncfs(0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000280)) prctl$setendian(0x14, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000080)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000200), 0x4) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) clock_adjtime(0x0, &(0x7f00000004c0)) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000600)={0x7}, 0x7) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 10:21:09 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) socket$inet_tcp(0x2, 0x1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000001600), 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syncfs(0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000280)) prctl$setendian(0x14, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000080)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000200), 0x4) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) clock_adjtime(0x0, &(0x7f00000004c0)) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000600)={0x7}, 0x7) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 10:21:10 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x800000027, &(0x7f0000000000)={@multicast1, @local, @remote}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter\x00') setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)={@multicast1, @local, 0x0, 0x2, [@remote, @broadcast]}, 0x18) preadv(r1, &(0x7f0000000600), 0x1000000000000134, 0x10400002) 10:21:10 executing program 5: ioprio_set$uid(0x0, 0x0, 0x80003) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000780)) fstat(0xffffffffffffffff, &(0x7f00000003c0)) socket$inet_tcp(0x2, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000180)='./file0\x00'}, 0x10) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000280)) pwritev(0xffffffffffffffff, &(0x7f0000000ac0), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a00)) getpgid(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000c00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000c40)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002480), &(0x7f00000024c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 10:21:10 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x800000027, &(0x7f0000000000)={@multicast1, @local, @remote}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter\x00') setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)={@multicast1, @local, 0x0, 0x2, [@remote, @broadcast]}, 0x18) preadv(r1, &(0x7f0000000600), 0x1000000000000134, 0x10400002) 10:21:10 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 10:21:10 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x800000027, &(0x7f0000000000)={@multicast1, @local, @remote}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter\x00') setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)={@multicast1, @local, 0x0, 0x2, [@remote, @broadcast]}, 0x18) preadv(r1, &(0x7f0000000600), 0x1000000000000134, 0x10400002) 10:21:10 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x800000027, &(0x7f0000000000)={@multicast1, @local, @remote}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter\x00') setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)={@multicast1, @local, 0x0, 0x2, [@remote, @broadcast]}, 0x18) preadv(r1, &(0x7f0000000600), 0x1000000000000134, 0x10400002) 10:21:10 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x800000027, &(0x7f0000000000)={@multicast1, @local, @remote}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter\x00') setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)={@multicast1, @local, 0x0, 0x2, [@remote, @broadcast]}, 0x18) preadv(r1, &(0x7f0000000600), 0x1000000000000134, 0x10400002) 10:21:10 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x800000027, &(0x7f0000000000)={@multicast1, @local, @remote}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter\x00') setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)={@multicast1, @local, 0x0, 0x2, [@remote, @broadcast]}, 0x18) preadv(r1, &(0x7f0000000600), 0x1000000000000134, 0x10400002) 10:21:10 executing program 2: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setrlimit(0x0, &(0x7f0000000400)) select(0x40, &(0x7f0000000240), &(0x7f0000000280)={0x1}, &(0x7f0000000340), &(0x7f0000000380)={0x77359400}) memfd_create(&(0x7f0000000300)='selinuxem0vboxnet1\x00', 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) memfd_create(&(0x7f0000000040)='posix_acl_access}%\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 10:21:10 executing program 1: unshare(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x0, &(0x7f0000000040)}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) pipe(&(0x7f0000000200)) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000400)={0x9}, 0x9) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") epoll_create1(0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000140)) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@un=@abs, &(0x7f0000000340)=0x80) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) getgroups(0x0, &(0x7f0000000380)) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getgroups(0x202, &(0x7f0000000480)) getpgrp(0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x0) memfd_create(&(0x7f0000000140)='\'\\+}ppp0\x00', 0x0) eventfd(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:21:10 executing program 1: unshare(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x0, &(0x7f0000000040)}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) pipe(&(0x7f0000000200)) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000400)={0x9}, 0x9) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") epoll_create1(0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000140)) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@un=@abs, &(0x7f0000000340)=0x80) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) getgroups(0x0, &(0x7f0000000380)) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getgroups(0x202, &(0x7f0000000480)) getpgrp(0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x0) memfd_create(&(0x7f0000000140)='\'\\+}ppp0\x00', 0x0) eventfd(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:21:10 executing program 2: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setrlimit(0x0, &(0x7f0000000400)) select(0x40, &(0x7f0000000240), &(0x7f0000000280)={0x1}, &(0x7f0000000340), &(0x7f0000000380)={0x77359400}) memfd_create(&(0x7f0000000300)='selinuxem0vboxnet1\x00', 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) memfd_create(&(0x7f0000000040)='posix_acl_access}%\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 10:21:10 executing program 3: signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000300)) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000400)={0x0, &(0x7f00000003c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000080)={'IDLETIMER\x00'}, &(0x7f0000000280)=0x82) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@local, @remote, @dev}, &(0x7f00000002c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000240)={'vcan0\x00', {0x2, 0x0, @local}}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 10:21:10 executing program 4: io_setup(0x2, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x6e, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback, @mcast2, @mcast1}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000002c0)) 10:21:10 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) dup2(0xffffffffffffffff, 0xffffffffffffffff) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) epoll_create1(0x0) socket$netlink(0x10, 0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 10:21:11 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 10:21:11 executing program 2: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setrlimit(0x0, &(0x7f0000000400)) select(0x40, &(0x7f0000000240), &(0x7f0000000280)={0x1}, &(0x7f0000000340), &(0x7f0000000380)={0x77359400}) memfd_create(&(0x7f0000000300)='selinuxem0vboxnet1\x00', 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) memfd_create(&(0x7f0000000040)='posix_acl_access}%\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 10:21:11 executing program 1: unshare(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x0, &(0x7f0000000040)}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) pipe(&(0x7f0000000200)) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000400)={0x9}, 0x9) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") epoll_create1(0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000140)) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@un=@abs, &(0x7f0000000340)=0x80) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) getgroups(0x0, &(0x7f0000000380)) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getgroups(0x202, &(0x7f0000000480)) getpgrp(0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x0) memfd_create(&(0x7f0000000140)='\'\\+}ppp0\x00', 0x0) eventfd(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:21:11 executing program 2: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) setrlimit(0x0, &(0x7f0000000400)) select(0x40, &(0x7f0000000240), &(0x7f0000000280)={0x1}, &(0x7f0000000340), &(0x7f0000000380)={0x77359400}) memfd_create(&(0x7f0000000300)='selinuxem0vboxnet1\x00', 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) memfd_create(&(0x7f0000000040)='posix_acl_access}%\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 10:21:11 executing program 1: unshare(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x0, &(0x7f0000000040)}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) pipe(&(0x7f0000000200)) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000400)={0x9}, 0x9) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") epoll_create1(0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000140)) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@un=@abs, &(0x7f0000000340)=0x80) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) getgroups(0x0, &(0x7f0000000380)) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getgroups(0x202, &(0x7f0000000480)) getpgrp(0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000240), 0x0) memfd_create(&(0x7f0000000140)='\'\\+}ppp0\x00', 0x0) eventfd(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:21:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00009e7000)={&(0x7f0000bfeff4), 0xc, &(0x7f0000329000)={&(0x7f0000369fa8)=@newneigh={0x24, 0x1c, 0x509, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, [@NDA_DST_IPV4={0x8}]}, 0x24}}, 0x0) 10:21:11 executing program 1: rt_sigpending(&(0x7f0000000080), 0x8) times(&(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000200)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) syz_execute_func(&(0x7f0000000240)="428055a02ec402ed07faf4e37d0fe1fb6920375137c339392a5a8e38211a1aa564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 10:21:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00009e7000)={&(0x7f0000bfeff4), 0xc, &(0x7f0000329000)={&(0x7f0000369fa8)=@newneigh={0x24, 0x1c, 0x509, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, [@NDA_DST_IPV4={0x8}]}, 0x24}}, 0x0) 10:21:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00009e7000)={&(0x7f0000bfeff4), 0xc, &(0x7f0000329000)={&(0x7f0000369fa8)=@newneigh={0x24, 0x1c, 0x509, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, [@NDA_DST_IPV4={0x8}]}, 0x24}}, 0x0) 10:21:11 executing program 3: signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000300)) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000400)={0x0, &(0x7f00000003c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000080)={'IDLETIMER\x00'}, &(0x7f0000000280)=0x82) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@local, @remote, @dev}, &(0x7f00000002c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000240)={'vcan0\x00', {0x2, 0x0, @local}}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 10:21:11 executing program 4: io_setup(0x2, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x6e, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback, @mcast2, @mcast1}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000002c0)) 10:21:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00009e7000)={&(0x7f0000bfeff4), 0xc, &(0x7f0000329000)={&(0x7f0000369fa8)=@newneigh={0x24, 0x1c, 0x509, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, [@NDA_DST_IPV4={0x8}]}, 0x24}}, 0x0) 10:21:11 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) dup2(0xffffffffffffffff, 0xffffffffffffffff) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) epoll_create1(0x0) socket$netlink(0x10, 0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 10:21:11 executing program 2: signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000300)) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000400)={0x0, &(0x7f00000003c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000080)={'IDLETIMER\x00'}, &(0x7f0000000280)=0x82) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@local, @remote, @dev}, &(0x7f00000002c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000240)={'vcan0\x00', {0x2, 0x0, @local}}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 10:21:11 executing program 0: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:21:12 executing program 1: rt_sigpending(&(0x7f0000000080), 0x8) times(&(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000200)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) syz_execute_func(&(0x7f0000000240)="428055a02ec402ed07faf4e37d0fe1fb6920375137c339392a5a8e38211a1aa564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 10:21:12 executing program 3: signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000300)) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000400)={0x0, &(0x7f00000003c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000080)={'IDLETIMER\x00'}, &(0x7f0000000280)=0x82) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@local, @remote, @dev}, &(0x7f00000002c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000240)={'vcan0\x00', {0x2, 0x0, @local}}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 10:21:12 executing program 4: io_setup(0x2, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x6e, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback, @mcast2, @mcast1}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000002c0)) 10:21:12 executing program 2: signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000300)) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000400)={0x0, &(0x7f00000003c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000080)={'IDLETIMER\x00'}, &(0x7f0000000280)=0x82) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@local, @remote, @dev}, &(0x7f00000002c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000240)={'vcan0\x00', {0x2, 0x0, @local}}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 10:21:12 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) dup2(0xffffffffffffffff, 0xffffffffffffffff) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) epoll_create1(0x0) socket$netlink(0x10, 0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 10:21:12 executing program 0: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:21:13 executing program 1: rt_sigpending(&(0x7f0000000080), 0x8) times(&(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000200)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) syz_execute_func(&(0x7f0000000240)="428055a02ec402ed07faf4e37d0fe1fb6920375137c339392a5a8e38211a1aa564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 10:21:13 executing program 3: signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000300)) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000400)={0x0, &(0x7f00000003c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000080)={'IDLETIMER\x00'}, &(0x7f0000000280)=0x82) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@local, @remote, @dev}, &(0x7f00000002c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000240)={'vcan0\x00', {0x2, 0x0, @local}}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 10:21:13 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) dup2(0xffffffffffffffff, 0xffffffffffffffff) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) epoll_create1(0x0) socket$netlink(0x10, 0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 10:21:13 executing program 2: signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000300)) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000400)={0x0, &(0x7f00000003c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000080)={'IDLETIMER\x00'}, &(0x7f0000000280)=0x82) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@local, @remote, @dev}, &(0x7f00000002c0)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000240)={'vcan0\x00', {0x2, 0x0, @local}}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 10:21:13 executing program 4: io_setup(0x2, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) accept4$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x6e, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback, @mcast2, @mcast1}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000002c0)) 10:21:13 executing program 0: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:21:14 executing program 1: rt_sigpending(&(0x7f0000000080), 0x8) times(&(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000200)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) syz_execute_func(&(0x7f0000000240)="428055a02ec402ed07faf4e37d0fe1fb6920375137c339392a5a8e38211a1aa564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 10:21:14 executing program 3: umount2(&(0x7f00000008c0)='./file0/file0\x00', 0xfffffffffffffffd) seccomp(0x0, 0x0, &(0x7f0000000100)) lstat(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000140)) fstat(0xffffffffffffff9c, &(0x7f00000001c0)) pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)='./file0/../file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) open(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open$dir(&(0x7f0000000600)='./file0/../file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000900)="428055a0376969ef69dc3641ffaa32233333c4c3dd6ccbd541a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e20598e5d1") dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000480), 0x4) unlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) 10:21:14 executing program 5: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) ioprio_set$uid(0x0, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x2) getgroups(0x0, &(0x7f0000000140)) getgroups(0x0, &(0x7f00000001c0)) setregid(0x0, 0x0) socket(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000380)='fo\x00'}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) getegid() getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000d00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d40)={{{@in=@remote, @in6=@ipv4={[], [], @local}}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000e40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e80), &(0x7f0000000ec0)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000f00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000001040)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001080), &(0x7f00000010c0)=0xc) getpid() getuid() getgroups(0x0, &(0x7f0000001100)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002300), 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000440), &(0x7f00000003c0)=0xfffffffffffffee0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a450f6907c44379dfb9d6adbe90dfbbd89f7f") setrlimit(0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) memfd_create(&(0x7f0000000180)='keyring\x00', 0x0) syz_execute_func(&(0x7f0000001140)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 10:21:14 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x0, &(0x7f0000000100)}, 0x10) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:21:14 executing program 0: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:21:14 executing program 4: syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='comm\x00') memfd_create(&(0x7f0000000040)="3100000000a73f33efc6d1a6230d8379f3b2e6620000000000000000000000ffff7f1794245ee14f62e1", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f00000008c0)=""/165) getresuid(&(0x7f0000000640), &(0x7f0000000700), &(0x7f0000000740)) lstat(&(0x7f0000000800)='./file2\x00', &(0x7f0000000840)) getgroups(0x0, &(0x7f00000009c0)) getresuid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) stat(&(0x7f0000000ac0)='./file1\x00', &(0x7f0000000b00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000b80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001440)={{{@in, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc) fstat(0xffffffffffffffff, &(0x7f00000015c0)) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 10:21:14 executing program 5: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) ioprio_set$uid(0x0, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x2) getgroups(0x0, &(0x7f0000000140)) getgroups(0x0, &(0x7f00000001c0)) setregid(0x0, 0x0) socket(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000380)='fo\x00'}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) getegid() getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000d00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d40)={{{@in=@remote, @in6=@ipv4={[], [], @local}}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000e40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e80), &(0x7f0000000ec0)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000f00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000001040)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001080), &(0x7f00000010c0)=0xc) getpid() getuid() getgroups(0x0, &(0x7f0000001100)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002300), 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000440), &(0x7f00000003c0)=0xfffffffffffffee0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a450f6907c44379dfb9d6adbe90dfbbd89f7f") setrlimit(0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) memfd_create(&(0x7f0000000180)='keyring\x00', 0x0) syz_execute_func(&(0x7f0000001140)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 10:21:14 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x0, &(0x7f0000000100)}, 0x10) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:21:14 executing program 5: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) ioprio_set$uid(0x0, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x2) getgroups(0x0, &(0x7f0000000140)) getgroups(0x0, &(0x7f00000001c0)) setregid(0x0, 0x0) socket(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000380)='fo\x00'}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) getegid() getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000d00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d40)={{{@in=@remote, @in6=@ipv4={[], [], @local}}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000e40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e80), &(0x7f0000000ec0)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000f00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000001040)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001080), &(0x7f00000010c0)=0xc) getpid() getuid() getgroups(0x0, &(0x7f0000001100)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002300), 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000440), &(0x7f00000003c0)=0xfffffffffffffee0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a450f6907c44379dfb9d6adbe90dfbbd89f7f") setrlimit(0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) memfd_create(&(0x7f0000000180)='keyring\x00', 0x0) syz_execute_func(&(0x7f0000001140)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 10:21:14 executing program 1: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) ioprio_set$uid(0x0, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x2) getgroups(0x0, &(0x7f0000000140)) getgroups(0x0, &(0x7f00000001c0)) setregid(0x0, 0x0) socket(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000380)='fo\x00'}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) getegid() getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000d00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d40)={{{@in=@remote, @in6=@ipv4={[], [], @local}}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000e40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e80), &(0x7f0000000ec0)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000f00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000001040)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001080), &(0x7f00000010c0)=0xc) getpid() getuid() getgroups(0x0, &(0x7f0000001100)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002300), 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000440), &(0x7f00000003c0)=0xfffffffffffffee0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a450f6907c44379dfb9d6adbe90dfbbd89f7f") setrlimit(0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) memfd_create(&(0x7f0000000180)='keyring\x00', 0x0) syz_execute_func(&(0x7f0000001140)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 10:21:15 executing program 5: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) ioprio_set$uid(0x0, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x2) getgroups(0x0, &(0x7f0000000140)) getgroups(0x0, &(0x7f00000001c0)) setregid(0x0, 0x0) socket(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000380)='fo\x00'}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) getegid() getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000d00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d40)={{{@in=@remote, @in6=@ipv4={[], [], @local}}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000e40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e80), &(0x7f0000000ec0)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000f00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000001040)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001080), &(0x7f00000010c0)=0xc) getpid() getuid() getgroups(0x0, &(0x7f0000001100)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002300), 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000440), &(0x7f00000003c0)=0xfffffffffffffee0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a450f6907c44379dfb9d6adbe90dfbbd89f7f") setrlimit(0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) memfd_create(&(0x7f0000000180)='keyring\x00', 0x0) syz_execute_func(&(0x7f0000001140)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 10:21:15 executing program 1: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) ioprio_set$uid(0x0, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x2) getgroups(0x0, &(0x7f0000000140)) getgroups(0x0, &(0x7f00000001c0)) setregid(0x0, 0x0) socket(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000380)='fo\x00'}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) getegid() getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000d00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d40)={{{@in=@remote, @in6=@ipv4={[], [], @local}}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000e40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e80), &(0x7f0000000ec0)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000f00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000001040)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001080), &(0x7f00000010c0)=0xc) getpid() getuid() getgroups(0x0, &(0x7f0000001100)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002300), 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000440), &(0x7f00000003c0)=0xfffffffffffffee0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a450f6907c44379dfb9d6adbe90dfbbd89f7f") setrlimit(0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) memfd_create(&(0x7f0000000180)='keyring\x00', 0x0) syz_execute_func(&(0x7f0000001140)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 10:21:15 executing program 3: umount2(&(0x7f00000008c0)='./file0/file0\x00', 0xfffffffffffffffd) seccomp(0x0, 0x0, &(0x7f0000000100)) lstat(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000140)) fstat(0xffffffffffffff9c, &(0x7f00000001c0)) pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)='./file0/../file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) open(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open$dir(&(0x7f0000000600)='./file0/../file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000900)="428055a0376969ef69dc3641ffaa32233333c4c3dd6ccbd541a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e20598e5d1") dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000480), 0x4) unlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) 10:21:15 executing program 5: rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/enforce\x00', 0x0, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000480)={0x7}, 0x7) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)) timer_gettime(0x0, &(0x7f00000002c0)) epoll_create1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getpgid(0x0) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) fstat(0xffffffffffffffff, &(0x7f0000002e00)) getpid() stat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f40), &(0x7f0000002f80)=0xc) getresuid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003080), &(0x7f00000030c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000003100)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000003180)='./file0\x00', &(0x7f00000031c0)) stat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f0000001880)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002cc0), 0x0, &(0x7f0000003300)}, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000400)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000015c0)) accept4$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) epoll_create(0x0) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000004c0)) finit_module(0xffffffffffffffff, &(0x7f0000000440)='!&\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000500)) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080), 0x4) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001700)={{{@in6=@ipv4={[], [], @dev}, @in6=@loopback}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000001800)=0xe8) getgroups(0x0, &(0x7f0000001840)) fchownat(0xffffffffffffffff, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 10:21:15 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x0, &(0x7f0000000100)}, 0x10) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:21:15 executing program 1: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) ioprio_set$uid(0x0, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x2) getgroups(0x0, &(0x7f0000000140)) getgroups(0x0, &(0x7f00000001c0)) setregid(0x0, 0x0) socket(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000380)='fo\x00'}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) getegid() getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000d00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d40)={{{@in=@remote, @in6=@ipv4={[], [], @local}}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000e40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e80), &(0x7f0000000ec0)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000f00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000001040)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001080), &(0x7f00000010c0)=0xc) getpid() getuid() getgroups(0x0, &(0x7f0000001100)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002300), 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000440), &(0x7f00000003c0)=0xfffffffffffffee0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a450f6907c44379dfb9d6adbe90dfbbd89f7f") setrlimit(0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) memfd_create(&(0x7f0000000180)='keyring\x00', 0x0) syz_execute_func(&(0x7f0000001140)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 10:21:15 executing program 0: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 10:21:15 executing program 4: syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='comm\x00') memfd_create(&(0x7f0000000040)="3100000000a73f33efc6d1a6230d8379f3b2e6620000000000000000000000ffff7f1794245ee14f62e1", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f00000008c0)=""/165) getresuid(&(0x7f0000000640), &(0x7f0000000700), &(0x7f0000000740)) lstat(&(0x7f0000000800)='./file2\x00', &(0x7f0000000840)) getgroups(0x0, &(0x7f00000009c0)) getresuid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) stat(&(0x7f0000000ac0)='./file1\x00', &(0x7f0000000b00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000b80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001440)={{{@in, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc) fstat(0xffffffffffffffff, &(0x7f00000015c0)) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 10:21:15 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffa) getgroups(0x0, &(0x7f0000000400)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_emit_ethernet(0x0, &(0x7f0000000000)=ANY=[], &(0x7f0000000480)) fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sync() syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") socket$inet6_udplite(0xa, 0x2, 0x88) accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0) pipe(&(0x7f0000000540)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x3ce}, 0x58) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) futex(&(0x7f00000004c0), 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000380), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 10:21:15 executing program 0: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 10:21:15 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x0, &(0x7f0000000100)}, 0x10) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:21:15 executing program 0: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 10:21:15 executing program 0: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 10:21:16 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000880)=""/192, &(0x7f0000000940)=0xc0) seccomp(0x0, 0x0, &(0x7f0000000340)) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) creat(&(0x7f00000003c0)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000400), 0x0) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000980)) getresuid(&(0x7f0000000800), &(0x7f0000000a00), &(0x7f0000000a40)) getuid() stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getresuid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) getgroups(0x0, &(0x7f0000000c00)) fstat(0xffffffffffffffff, &(0x7f0000000c40)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 421.535733] audit: type=1326 audit(1536920475.985:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=17004 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 10:21:16 executing program 3: umount2(&(0x7f00000008c0)='./file0/file0\x00', 0xfffffffffffffffd) seccomp(0x0, 0x0, &(0x7f0000000100)) lstat(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000140)) fstat(0xffffffffffffff9c, &(0x7f00000001c0)) pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)='./file0/../file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) open(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open$dir(&(0x7f0000000600)='./file0/../file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000900)="428055a0376969ef69dc3641ffaa32233333c4c3dd6ccbd541a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e20598e5d1") dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000480), 0x4) unlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) 10:21:16 executing program 5: rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/enforce\x00', 0x0, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000480)={0x7}, 0x7) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)) timer_gettime(0x0, &(0x7f00000002c0)) epoll_create1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getpgid(0x0) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) fstat(0xffffffffffffffff, &(0x7f0000002e00)) getpid() stat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f40), &(0x7f0000002f80)=0xc) getresuid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003080), &(0x7f00000030c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000003100)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000003180)='./file0\x00', &(0x7f00000031c0)) stat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f0000001880)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002cc0), 0x0, &(0x7f0000003300)}, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000400)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000015c0)) accept4$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) epoll_create(0x0) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000004c0)) finit_module(0xffffffffffffffff, &(0x7f0000000440)='!&\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000500)) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080), 0x4) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001700)={{{@in6=@ipv4={[], [], @dev}, @in6=@loopback}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000001800)=0xe8) getgroups(0x0, &(0x7f0000001840)) fchownat(0xffffffffffffffff, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 10:21:16 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000880)=""/192, &(0x7f0000000940)=0xc0) seccomp(0x0, 0x0, &(0x7f0000000340)) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) creat(&(0x7f00000003c0)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000400), 0x0) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000980)) getresuid(&(0x7f0000000800), &(0x7f0000000a00), &(0x7f0000000a40)) getuid() stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getresuid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) getgroups(0x0, &(0x7f0000000c00)) fstat(0xffffffffffffffff, &(0x7f0000000c40)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 10:21:16 executing program 2: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000880)=""/192, &(0x7f0000000940)=0xc0) seccomp(0x0, 0x0, &(0x7f0000000340)) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) creat(&(0x7f00000003c0)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000400), 0x0) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000980)) getresuid(&(0x7f0000000800), &(0x7f0000000a00), &(0x7f0000000a40)) getuid() stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getresuid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) getgroups(0x0, &(0x7f0000000c00)) fstat(0xffffffffffffffff, &(0x7f0000000c40)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 10:21:16 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000880)=""/192, &(0x7f0000000940)=0xc0) seccomp(0x0, 0x0, &(0x7f0000000340)) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) creat(&(0x7f00000003c0)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000400), 0x0) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000980)) getresuid(&(0x7f0000000800), &(0x7f0000000a00), &(0x7f0000000a40)) getuid() stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getresuid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) getgroups(0x0, &(0x7f0000000c00)) fstat(0xffffffffffffffff, &(0x7f0000000c40)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 422.220519] audit: type=1326 audit(1536920476.675:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=17004 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 10:21:17 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000880)=""/192, &(0x7f0000000940)=0xc0) seccomp(0x0, 0x0, &(0x7f0000000340)) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) creat(&(0x7f00000003c0)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000400), 0x0) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000980)) getresuid(&(0x7f0000000800), &(0x7f0000000a00), &(0x7f0000000a40)) getuid() stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getresuid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) getgroups(0x0, &(0x7f0000000c00)) fstat(0xffffffffffffffff, &(0x7f0000000c40)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 10:21:17 executing program 2: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000880)=""/192, &(0x7f0000000940)=0xc0) seccomp(0x0, 0x0, &(0x7f0000000340)) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) creat(&(0x7f00000003c0)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000400), 0x0) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000980)) getresuid(&(0x7f0000000800), &(0x7f0000000a00), &(0x7f0000000a40)) getuid() stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getresuid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) getgroups(0x0, &(0x7f0000000c00)) fstat(0xffffffffffffffff, &(0x7f0000000c40)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 10:21:17 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffa) getgroups(0x0, &(0x7f0000000400)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_emit_ethernet(0x0, &(0x7f0000000000)=ANY=[], &(0x7f0000000480)) fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sync() syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") socket$inet6_udplite(0xa, 0x2, 0x88) accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0) pipe(&(0x7f0000000540)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x3ce}, 0x58) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) futex(&(0x7f00000004c0), 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000380), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 10:21:17 executing program 3: umount2(&(0x7f00000008c0)='./file0/file0\x00', 0xfffffffffffffffd) seccomp(0x0, 0x0, &(0x7f0000000100)) lstat(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000140)) fstat(0xffffffffffffff9c, &(0x7f00000001c0)) pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)='./file0/../file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) open(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open$dir(&(0x7f0000000600)='./file0/../file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000900)="428055a0376969ef69dc3641ffaa32233333c4c3dd6ccbd541a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e20598e5d1") dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000480), 0x4) unlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) 10:21:17 executing program 5: rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/enforce\x00', 0x0, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000480)={0x7}, 0x7) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)) timer_gettime(0x0, &(0x7f00000002c0)) epoll_create1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getpgid(0x0) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) fstat(0xffffffffffffffff, &(0x7f0000002e00)) getpid() stat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f40), &(0x7f0000002f80)=0xc) getresuid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003080), &(0x7f00000030c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000003100)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000003180)='./file0\x00', &(0x7f00000031c0)) stat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f0000001880)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002cc0), 0x0, &(0x7f0000003300)}, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000400)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000015c0)) accept4$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) epoll_create(0x0) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000004c0)) finit_module(0xffffffffffffffff, &(0x7f0000000440)='!&\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000500)) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080), 0x4) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001700)={{{@in6=@ipv4={[], [], @dev}, @in6=@loopback}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000001800)=0xe8) getgroups(0x0, &(0x7f0000001840)) fchownat(0xffffffffffffffff, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 10:21:17 executing program 4: syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='comm\x00') memfd_create(&(0x7f0000000040)="3100000000a73f33efc6d1a6230d8379f3b2e6620000000000000000000000ffff7f1794245ee14f62e1", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f00000008c0)=""/165) getresuid(&(0x7f0000000640), &(0x7f0000000700), &(0x7f0000000740)) lstat(&(0x7f0000000800)='./file2\x00', &(0x7f0000000840)) getgroups(0x0, &(0x7f00000009c0)) getresuid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) stat(&(0x7f0000000ac0)='./file1\x00', &(0x7f0000000b00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000b80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001440)={{{@in, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc) fstat(0xffffffffffffffff, &(0x7f00000015c0)) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 10:21:17 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000880)=""/192, &(0x7f0000000940)=0xc0) seccomp(0x0, 0x0, &(0x7f0000000340)) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) creat(&(0x7f00000003c0)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000400), 0x0) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000980)) getresuid(&(0x7f0000000800), &(0x7f0000000a00), &(0x7f0000000a40)) getuid() stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getresuid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) getgroups(0x0, &(0x7f0000000c00)) fstat(0xffffffffffffffff, &(0x7f0000000c40)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 10:21:17 executing program 2: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000880)=""/192, &(0x7f0000000940)=0xc0) seccomp(0x0, 0x0, &(0x7f0000000340)) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) creat(&(0x7f00000003c0)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000400), 0x0) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000980)) getresuid(&(0x7f0000000800), &(0x7f0000000a00), &(0x7f0000000a40)) getuid() stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getresuid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) getgroups(0x0, &(0x7f0000000c00)) fstat(0xffffffffffffffff, &(0x7f0000000c40)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 422.739460] audit: type=1326 audit(1536920477.185:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=17054 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 10:21:17 executing program 2: rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/enforce\x00', 0x0, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000480)={0x7}, 0x7) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)) timer_gettime(0x0, &(0x7f00000002c0)) epoll_create1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getpgid(0x0) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) fstat(0xffffffffffffffff, &(0x7f0000002e00)) getpid() stat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f40), &(0x7f0000002f80)=0xc) getresuid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003080), &(0x7f00000030c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000003100)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000003180)='./file0\x00', &(0x7f00000031c0)) stat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f0000001880)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002cc0), 0x0, &(0x7f0000003300)}, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000400)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000015c0)) accept4$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) epoll_create(0x0) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000004c0)) finit_module(0xffffffffffffffff, &(0x7f0000000440)='!&\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000500)) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080), 0x4) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001700)={{{@in6=@ipv4={[], [], @dev}, @in6=@loopback}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000001800)=0xe8) getgroups(0x0, &(0x7f0000001840)) fchownat(0xffffffffffffffff, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 10:21:17 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000880)=""/192, &(0x7f0000000940)=0xc0) seccomp(0x0, 0x0, &(0x7f0000000340)) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) creat(&(0x7f00000003c0)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000400), 0x0) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000980)) getresuid(&(0x7f0000000800), &(0x7f0000000a00), &(0x7f0000000a40)) getuid() stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getresuid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) getgroups(0x0, &(0x7f0000000c00)) fstat(0xffffffffffffffff, &(0x7f0000000c40)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 10:21:17 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000880)=""/192, &(0x7f0000000940)=0xc0) seccomp(0x0, 0x0, &(0x7f0000000340)) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) creat(&(0x7f00000003c0)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000400), 0x0) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000980)) getresuid(&(0x7f0000000800), &(0x7f0000000a00), &(0x7f0000000a40)) getuid() stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getresuid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) getgroups(0x0, &(0x7f0000000c00)) fstat(0xffffffffffffffff, &(0x7f0000000c40)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 10:21:17 executing program 0: rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/enforce\x00', 0x0, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000480)={0x7}, 0x7) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)) timer_gettime(0x0, &(0x7f00000002c0)) epoll_create1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getpgid(0x0) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) fstat(0xffffffffffffffff, &(0x7f0000002e00)) getpid() stat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f40), &(0x7f0000002f80)=0xc) getresuid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003080), &(0x7f00000030c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000003100)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000003180)='./file0\x00', &(0x7f00000031c0)) stat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f0000001880)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002cc0), 0x0, &(0x7f0000003300)}, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000400)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000015c0)) accept4$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) epoll_create(0x0) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000004c0)) finit_module(0xffffffffffffffff, &(0x7f0000000440)='!&\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000500)) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080), 0x4) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001700)={{{@in6=@ipv4={[], [], @dev}, @in6=@loopback}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000001800)=0xe8) getgroups(0x0, &(0x7f0000001840)) fchownat(0xffffffffffffffff, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 10:21:17 executing program 5: rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/enforce\x00', 0x0, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000480)={0x7}, 0x7) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)) timer_gettime(0x0, &(0x7f00000002c0)) epoll_create1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getpgid(0x0) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) fstat(0xffffffffffffffff, &(0x7f0000002e00)) getpid() stat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f40), &(0x7f0000002f80)=0xc) getresuid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003080), &(0x7f00000030c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000003100)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000003180)='./file0\x00', &(0x7f00000031c0)) stat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f0000001880)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002cc0), 0x0, &(0x7f0000003300)}, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000400)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000015c0)) accept4$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) epoll_create(0x0) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000004c0)) finit_module(0xffffffffffffffff, &(0x7f0000000440)='!&\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000500)) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080), 0x4) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001700)={{{@in6=@ipv4={[], [], @dev}, @in6=@loopback}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000001800)=0xe8) getgroups(0x0, &(0x7f0000001840)) fchownat(0xffffffffffffffff, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 10:21:17 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffa) getgroups(0x0, &(0x7f0000000400)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_emit_ethernet(0x0, &(0x7f0000000000)=ANY=[], &(0x7f0000000480)) fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sync() syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") socket$inet6_udplite(0xa, 0x2, 0x88) accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0) pipe(&(0x7f0000000540)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x3ce}, 0x58) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) futex(&(0x7f00000004c0), 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000380), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 10:21:17 executing program 3: rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/enforce\x00', 0x0, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000480)={0x7}, 0x7) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)) timer_gettime(0x0, &(0x7f00000002c0)) epoll_create1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getpgid(0x0) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) fstat(0xffffffffffffffff, &(0x7f0000002e00)) getpid() stat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f40), &(0x7f0000002f80)=0xc) getresuid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003080), &(0x7f00000030c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000003100)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000003180)='./file0\x00', &(0x7f00000031c0)) stat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f0000001880)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002cc0), 0x0, &(0x7f0000003300)}, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000400)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000015c0)) accept4$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) epoll_create(0x0) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000004c0)) finit_module(0xffffffffffffffff, &(0x7f0000000440)='!&\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000500)) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080), 0x4) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001700)={{{@in6=@ipv4={[], [], @dev}, @in6=@loopback}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000001800)=0xe8) getgroups(0x0, &(0x7f0000001840)) fchownat(0xffffffffffffffff, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") [ 423.588873] audit: type=1326 audit(1536920478.035:58): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=17097 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 10:21:18 executing program 2: rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/enforce\x00', 0x0, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000480)={0x7}, 0x7) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)) timer_gettime(0x0, &(0x7f00000002c0)) epoll_create1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getpgid(0x0) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) fstat(0xffffffffffffffff, &(0x7f0000002e00)) getpid() stat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f40), &(0x7f0000002f80)=0xc) getresuid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003080), &(0x7f00000030c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000003100)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000003180)='./file0\x00', &(0x7f00000031c0)) stat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f0000001880)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002cc0), 0x0, &(0x7f0000003300)}, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000400)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000015c0)) accept4$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) epoll_create(0x0) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000004c0)) finit_module(0xffffffffffffffff, &(0x7f0000000440)='!&\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000500)) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080), 0x4) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001700)={{{@in6=@ipv4={[], [], @dev}, @in6=@loopback}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000001800)=0xe8) getgroups(0x0, &(0x7f0000001840)) fchownat(0xffffffffffffffff, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 10:21:18 executing program 4: syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='comm\x00') memfd_create(&(0x7f0000000040)="3100000000a73f33efc6d1a6230d8379f3b2e6620000000000000000000000ffff7f1794245ee14f62e1", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f00000008c0)=""/165) getresuid(&(0x7f0000000640), &(0x7f0000000700), &(0x7f0000000740)) lstat(&(0x7f0000000800)='./file2\x00', &(0x7f0000000840)) getgroups(0x0, &(0x7f00000009c0)) getresuid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) stat(&(0x7f0000000ac0)='./file1\x00', &(0x7f0000000b00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000b80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001440)={{{@in, @in6}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc) fstat(0xffffffffffffffff, &(0x7f00000015c0)) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 10:21:18 executing program 0: rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/enforce\x00', 0x0, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000480)={0x7}, 0x7) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)) timer_gettime(0x0, &(0x7f00000002c0)) epoll_create1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getpgid(0x0) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) fstat(0xffffffffffffffff, &(0x7f0000002e00)) getpid() stat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f40), &(0x7f0000002f80)=0xc) getresuid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003080), &(0x7f00000030c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000003100)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000003180)='./file0\x00', &(0x7f00000031c0)) stat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f0000001880)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002cc0), 0x0, &(0x7f0000003300)}, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000400)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000015c0)) accept4$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) epoll_create(0x0) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000004c0)) finit_module(0xffffffffffffffff, &(0x7f0000000440)='!&\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000500)) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080), 0x4) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001700)={{{@in6=@ipv4={[], [], @dev}, @in6=@loopback}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000001800)=0xe8) getgroups(0x0, &(0x7f0000001840)) fchownat(0xffffffffffffffff, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 10:21:18 executing program 3: rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/enforce\x00', 0x0, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000480)={0x7}, 0x7) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)) timer_gettime(0x0, &(0x7f00000002c0)) epoll_create1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getpgid(0x0) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) fstat(0xffffffffffffffff, &(0x7f0000002e00)) getpid() stat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f40), &(0x7f0000002f80)=0xc) getresuid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003080), &(0x7f00000030c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000003100)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000003180)='./file0\x00', &(0x7f00000031c0)) stat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f0000001880)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002cc0), 0x0, &(0x7f0000003300)}, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000400)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000015c0)) accept4$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) epoll_create(0x0) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000004c0)) finit_module(0xffffffffffffffff, &(0x7f0000000440)='!&\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000500)) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080), 0x4) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001700)={{{@in6=@ipv4={[], [], @dev}, @in6=@loopback}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000001800)=0xe8) getgroups(0x0, &(0x7f0000001840)) fchownat(0xffffffffffffffff, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 10:21:18 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffa) getgroups(0x0, &(0x7f0000000400)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_emit_ethernet(0x0, &(0x7f0000000000)=ANY=[], &(0x7f0000000480)) fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sync() syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") socket$inet6_udplite(0xa, 0x2, 0x88) accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0) pipe(&(0x7f0000000540)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x3ce}, 0x58) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) futex(&(0x7f00000004c0), 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000380), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 10:21:18 executing program 5: truncate(&(0x7f0000000040)='./file0\x00', 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) socket$unix(0x1, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000004c0), 0xa) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/hash_stats\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:21:18 executing program 5: truncate(&(0x7f0000000040)='./file0\x00', 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) socket$unix(0x1, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000004c0), 0xa) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/hash_stats\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") [ 424.468626] audit: type=1326 audit(1536920478.911:59): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=17117 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 10:21:19 executing program 2: rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/enforce\x00', 0x0, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000480)={0x7}, 0x7) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)) timer_gettime(0x0, &(0x7f00000002c0)) epoll_create1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getpgid(0x0) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) fstat(0xffffffffffffffff, &(0x7f0000002e00)) getpid() stat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f40), &(0x7f0000002f80)=0xc) getresuid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003080), &(0x7f00000030c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000003100)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000003180)='./file0\x00', &(0x7f00000031c0)) stat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f0000001880)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002cc0), 0x0, &(0x7f0000003300)}, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000400)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000015c0)) accept4$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) epoll_create(0x0) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000004c0)) finit_module(0xffffffffffffffff, &(0x7f0000000440)='!&\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000500)) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080), 0x4) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001700)={{{@in6=@ipv4={[], [], @dev}, @in6=@loopback}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000001800)=0xe8) getgroups(0x0, &(0x7f0000001840)) fchownat(0xffffffffffffffff, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 10:21:19 executing program 5: truncate(&(0x7f0000000040)='./file0\x00', 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) socket$unix(0x1, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000004c0), 0xa) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/hash_stats\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:21:19 executing program 5: truncate(&(0x7f0000000040)='./file0\x00', 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) socket$unix(0x1, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000004c0), 0xa) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/hash_stats\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:21:19 executing program 0: rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/enforce\x00', 0x0, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000480)={0x7}, 0x7) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)) timer_gettime(0x0, &(0x7f00000002c0)) epoll_create1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getpgid(0x0) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) fstat(0xffffffffffffffff, &(0x7f0000002e00)) getpid() stat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f40), &(0x7f0000002f80)=0xc) getresuid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003080), &(0x7f00000030c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000003100)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000003180)='./file0\x00', &(0x7f00000031c0)) stat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f0000001880)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002cc0), 0x0, &(0x7f0000003300)}, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000400)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000015c0)) accept4$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) epoll_create(0x0) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000004c0)) finit_module(0xffffffffffffffff, &(0x7f0000000440)='!&\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000500)) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080), 0x4) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001700)={{{@in6=@ipv4={[], [], @dev}, @in6=@loopback}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000001800)=0xe8) getgroups(0x0, &(0x7f0000001840)) fchownat(0xffffffffffffffff, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 10:21:19 executing program 4: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f0000000180)) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080), &(0x7f0000000140), 0x0, 0xfffffffffffffffe) socket$inet_icmp_raw(0x2, 0x3, 0x1) getpeername$inet(0xffffffffffffffff, &(0x7f0000004080)={0x2, 0x0, @multicast2}, &(0x7f00000041c0)=0x10) geteuid() write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)) keyctl$chown(0x4, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffffa) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") clock_gettime(0x0, &(0x7f00000003c0)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003e00), 0x0, 0x0, &(0x7f0000003fc0)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000040c0)={'gre0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.stat\x00', 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f00000042c0)=ANY=[], 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000004100), 0x88) 10:21:19 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x3) r3 = epoll_create(0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r4 = epoll_create(0x1) r5 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000050aff4)={0x20102001}) 10:21:19 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x3) r3 = epoll_create(0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r4 = epoll_create(0x1) r5 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000050aff4)={0x20102001}) 10:21:19 executing program 3: rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/enforce\x00', 0x0, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000480)={0x7}, 0x7) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)) timer_gettime(0x0, &(0x7f00000002c0)) epoll_create1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getpgid(0x0) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) fstat(0xffffffffffffffff, &(0x7f0000002e00)) getpid() stat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f40), &(0x7f0000002f80)=0xc) getresuid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003080), &(0x7f00000030c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000003100)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000003180)='./file0\x00', &(0x7f00000031c0)) stat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f0000001880)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002cc0), 0x0, &(0x7f0000003300)}, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000400)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000015c0)) accept4$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) epoll_create(0x0) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000004c0)) finit_module(0xffffffffffffffff, &(0x7f0000000440)='!&\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000500)) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080), 0x4) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001700)={{{@in6=@ipv4={[], [], @dev}, @in6=@loopback}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000001800)=0xe8) getgroups(0x0, &(0x7f0000001840)) fchownat(0xffffffffffffffff, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 10:21:19 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x3) r3 = epoll_create(0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r4 = epoll_create(0x1) r5 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000050aff4)={0x20102001}) 10:21:19 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x3) r3 = epoll_create(0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r4 = epoll_create(0x1) r5 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000050aff4)={0x20102001}) 10:21:19 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x3) r3 = epoll_create(0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r4 = epoll_create(0x1) r5 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000050aff4)={0x20102001}) 10:21:19 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x3) r3 = epoll_create(0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r4 = epoll_create(0x1) r5 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000050aff4)={0x20102001}) 10:21:19 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x3) r3 = epoll_create(0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r4 = epoll_create(0x1) r5 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000050aff4)={0x20102001}) 10:21:19 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x3) r3 = epoll_create(0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r4 = epoll_create(0x1) r5 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000050aff4)={0x20102001}) 10:21:19 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x3) r3 = epoll_create(0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r4 = epoll_create(0x1) r5 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000050aff4)={0x20102001}) 10:21:20 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x3) r3 = epoll_create(0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r4 = epoll_create(0x1) r5 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000050aff4)={0x20102001}) 10:21:20 executing program 4: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f0000000180)) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080), &(0x7f0000000140), 0x0, 0xfffffffffffffffe) socket$inet_icmp_raw(0x2, 0x3, 0x1) getpeername$inet(0xffffffffffffffff, &(0x7f0000004080)={0x2, 0x0, @multicast2}, &(0x7f00000041c0)=0x10) geteuid() write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)) keyctl$chown(0x4, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffffa) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") clock_gettime(0x0, &(0x7f00000003c0)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003e00), 0x0, 0x0, &(0x7f0000003fc0)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000040c0)={'gre0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.stat\x00', 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f00000042c0)=ANY=[], 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000004100), 0x88) 10:21:20 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x3) r3 = epoll_create(0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r4 = epoll_create(0x1) r5 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000050aff4)={0x20102001}) 10:21:20 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x3) r3 = epoll_create(0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r4 = epoll_create(0x1) r5 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000050aff4)={0x20102001}) 10:21:20 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x3) r3 = epoll_create(0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r4 = epoll_create(0x1) r5 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000050aff4)={0x20102001}) 10:21:20 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x3) r3 = epoll_create(0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r4 = epoll_create(0x1) r5 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000050aff4)={0x20102001}) 10:21:20 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x3) r3 = epoll_create(0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r4 = epoll_create(0x1) r5 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000050aff4)={0x20102001}) 10:21:20 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x3) r3 = epoll_create(0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r4 = epoll_create(0x1) r5 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000050aff4)={0x20102001}) 10:21:20 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x3) r3 = epoll_create(0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r4 = epoll_create(0x1) r5 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000050aff4)={0x20102001}) 10:21:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000980)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") add_key(&(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000006c0)='cifs.spnego\x00', &(0x7f0000000700), &(0x7f0000000740)='/dev/zero\x00', 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000780), &(0x7f00000007c0)=""/195, 0xc3, &(0x7f0000000940)={&(0x7f00000008c0)={'sha256-avx\x00'}, &(0x7f0000000900)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000340)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d00), &(0x7f0000001d40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001d80)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e00)={{{@in6=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000001f00)=0xe8) getresgid(&(0x7f0000001f40), &(0x7f0000001f80), &(0x7f0000001fc0)) getpgid(0x0) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000032c0)) getresuid(&(0x7f0000003300), &(0x7f0000003340), &(0x7f0000003380)) fstat(0xffffffffffffffff, &(0x7f00000033c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003440), &(0x7f0000003480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000034c0)={{{@in=@dev, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000035c0)=0xe8) getgroups(0x0, &(0x7f0000003600)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003640)={{{@in=@multicast2, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000003740)=0xe8) getgroups(0x0, &(0x7f0000003780)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003a40)={{{@in6}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003b40)=0xe8) getegid() getgroups(0x0, &(0x7f0000000140)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000c00)) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003c80)) 10:21:20 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x3) r3 = epoll_create(0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r4 = epoll_create(0x1) r5 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000050aff4)={0x20102001}) 10:21:20 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x3) r3 = epoll_create(0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r4 = epoll_create(0x1) r5 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000050aff4)={0x20102001}) 10:21:20 executing program 2: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) socket$inet_udplite(0x2, 0x2, 0x88) 10:21:21 executing program 4: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f0000000180)) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080), &(0x7f0000000140), 0x0, 0xfffffffffffffffe) socket$inet_icmp_raw(0x2, 0x3, 0x1) getpeername$inet(0xffffffffffffffff, &(0x7f0000004080)={0x2, 0x0, @multicast2}, &(0x7f00000041c0)=0x10) geteuid() write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)) keyctl$chown(0x4, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffffa) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") clock_gettime(0x0, &(0x7f00000003c0)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003e00), 0x0, 0x0, &(0x7f0000003fc0)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000040c0)={'gre0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.stat\x00', 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f00000042c0)=ANY=[], 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000004100), 0x88) 10:21:21 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x3) r3 = epoll_create(0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r4 = epoll_create(0x1) r5 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000050aff4)={0x20102001}) 10:21:21 executing program 1: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000080)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000001c0)=""/67) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x43}, 0x43) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000500)={0x43}, 0x43) socket$inet(0x2, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000640)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000740)={@multicast1, @broadcast}, &(0x7f0000000780)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000ac0)={@remote, @remote}, &(0x7f0000000b00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b40)={{{@in6=@mcast1, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000000c40)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000d40), &(0x7f0000000d80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000dc0)={'gre0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000e00)={'bcsh0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000e80)={@remote, @multicast1}, &(0x7f0000000ec0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003580)={@mcast2}, &(0x7f00000035c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003600)={{{@in6=@mcast2, @in6=@remote}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000003700)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003740)={'erspan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@local, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003880)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@mcast2}, &(0x7f0000003900)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000003940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0xfffffffffffffc54) accept4$packet(0xffffffffffffffff, &(0x7f0000003b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003b40)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004140)={0x0, @broadcast, @remote}, &(0x7f0000004180)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000041c0)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f00000042c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004300)={0x0, @broadcast, @loopback}, &(0x7f0000004340)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004380)={@multicast2, @remote}, &(0x7f00000043c0)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004400)={@multicast1, @remote}, &(0x7f0000004440)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004480)={{{@in=@multicast1, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000004580)=0xe8) accept4(0xffffffffffffffff, &(0x7f0000006980)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000006a00)=0x80, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006a40)={@mcast1}, &(0x7f0000006a80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006ac0)={{{@in6, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000006bc0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006cc0)={{{@in6=@remote, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000006dc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000cf40)={@local, @multicast2}, &(0x7f000000cf80)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000d7c0)={&(0x7f0000000240), 0xc, &(0x7f000000d780)={&(0x7f000000cfc0)={0x14}, 0x14}}, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000080)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000380), 0x8) fcntl$getflags(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000480)=ANY=[], 0x0) pipe2$9p(&(0x7f0000000040), 0x0) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 10:21:21 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x3) r3 = epoll_create(0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r4 = epoll_create(0x1) r5 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000050aff4)={0x20102001}) 10:21:21 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x3) r3 = epoll_create(0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r4 = epoll_create(0x1) r5 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000050aff4)={0x20102001}) 10:21:21 executing program 0: getcwd(&(0x7f0000000040)=""/188, 0xbc) prctl$setendian(0x14, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/context\x00', 0x2, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/member\x00', 0x2, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) syz_open_dev$binder(&(0x7f00000003c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='mounts\x00') openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000480)) socket$unix(0x1, 0x0, 0x0) inotify_init1(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) eventfd(0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000540)) fcntl$getown(0xffffffffffffffff, 0x9) setpgid(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000380)='vboxnet1:\x00', 0xfffffffffffffffa) keyctl$get_keyring_id(0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000180)='\x00'}, 0x10) creat(&(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a032b6b6a20838386830d30000ff0f183736e33addc422d5f2a68f097002cc9f66410b850f0000006205c7c7f2217c291a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267386bff6767f340a4212dfca50000262666430ffb348b1f7f") ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) 10:21:21 executing program 3: getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:21:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000980)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") add_key(&(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000006c0)='cifs.spnego\x00', &(0x7f0000000700), &(0x7f0000000740)='/dev/zero\x00', 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000780), &(0x7f00000007c0)=""/195, 0xc3, &(0x7f0000000940)={&(0x7f00000008c0)={'sha256-avx\x00'}, &(0x7f0000000900)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000340)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d00), &(0x7f0000001d40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001d80)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e00)={{{@in6=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000001f00)=0xe8) getresgid(&(0x7f0000001f40), &(0x7f0000001f80), &(0x7f0000001fc0)) getpgid(0x0) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000032c0)) getresuid(&(0x7f0000003300), &(0x7f0000003340), &(0x7f0000003380)) fstat(0xffffffffffffffff, &(0x7f00000033c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003440), &(0x7f0000003480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000034c0)={{{@in=@dev, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000035c0)=0xe8) getgroups(0x0, &(0x7f0000003600)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003640)={{{@in=@multicast2, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000003740)=0xe8) getgroups(0x0, &(0x7f0000003780)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003a40)={{{@in6}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003b40)=0xe8) getegid() getgroups(0x0, &(0x7f0000000140)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000c00)) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003c80)) 10:21:21 executing program 2: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) socket$inet_udplite(0x2, 0x2, 0x88) 10:21:21 executing program 4: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f0000000180)) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080), &(0x7f0000000140), 0x0, 0xfffffffffffffffe) socket$inet_icmp_raw(0x2, 0x3, 0x1) getpeername$inet(0xffffffffffffffff, &(0x7f0000004080)={0x2, 0x0, @multicast2}, &(0x7f00000041c0)=0x10) geteuid() write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)) keyctl$chown(0x4, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffffa) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") clock_gettime(0x0, &(0x7f00000003c0)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003e00), 0x0, 0x0, &(0x7f0000003fc0)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000040c0)={'gre0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.stat\x00', 0x0, 0x0) write$nbd(0xffffffffffffffff, &(0x7f00000042c0)=ANY=[], 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000004100), 0x88) 10:21:22 executing program 0: getcwd(&(0x7f0000000040)=""/188, 0xbc) prctl$setendian(0x14, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/context\x00', 0x2, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/member\x00', 0x2, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) syz_open_dev$binder(&(0x7f00000003c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='mounts\x00') openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000480)) socket$unix(0x1, 0x0, 0x0) inotify_init1(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) eventfd(0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000540)) fcntl$getown(0xffffffffffffffff, 0x9) setpgid(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000380)='vboxnet1:\x00', 0xfffffffffffffffa) keyctl$get_keyring_id(0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000180)='\x00'}, 0x10) creat(&(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a032b6b6a20838386830d30000ff0f183736e33addc422d5f2a68f097002cc9f66410b850f0000006205c7c7f2217c291a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267386bff6767f340a4212dfca50000262666430ffb348b1f7f") ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) 10:21:22 executing program 3: getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:21:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000980)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") add_key(&(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000006c0)='cifs.spnego\x00', &(0x7f0000000700), &(0x7f0000000740)='/dev/zero\x00', 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000780), &(0x7f00000007c0)=""/195, 0xc3, &(0x7f0000000940)={&(0x7f00000008c0)={'sha256-avx\x00'}, &(0x7f0000000900)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000340)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d00), &(0x7f0000001d40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001d80)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e00)={{{@in6=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000001f00)=0xe8) getresgid(&(0x7f0000001f40), &(0x7f0000001f80), &(0x7f0000001fc0)) getpgid(0x0) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000032c0)) getresuid(&(0x7f0000003300), &(0x7f0000003340), &(0x7f0000003380)) fstat(0xffffffffffffffff, &(0x7f00000033c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003440), &(0x7f0000003480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000034c0)={{{@in=@dev, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000035c0)=0xe8) getgroups(0x0, &(0x7f0000003600)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003640)={{{@in=@multicast2, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000003740)=0xe8) getgroups(0x0, &(0x7f0000003780)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003a40)={{{@in6}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003b40)=0xe8) getegid() getgroups(0x0, &(0x7f0000000140)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000c00)) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003c80)) 10:21:22 executing program 2: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) socket$inet_udplite(0x2, 0x2, 0x88) 10:21:23 executing program 1: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000080)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000001c0)=""/67) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x43}, 0x43) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000500)={0x43}, 0x43) socket$inet(0x2, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000640)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000740)={@multicast1, @broadcast}, &(0x7f0000000780)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000ac0)={@remote, @remote}, &(0x7f0000000b00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b40)={{{@in6=@mcast1, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000000c40)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000d40), &(0x7f0000000d80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000dc0)={'gre0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000e00)={'bcsh0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000e80)={@remote, @multicast1}, &(0x7f0000000ec0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003580)={@mcast2}, &(0x7f00000035c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003600)={{{@in6=@mcast2, @in6=@remote}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000003700)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003740)={'erspan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@local, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003880)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@mcast2}, &(0x7f0000003900)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000003940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0xfffffffffffffc54) accept4$packet(0xffffffffffffffff, &(0x7f0000003b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003b40)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004140)={0x0, @broadcast, @remote}, &(0x7f0000004180)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000041c0)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f00000042c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004300)={0x0, @broadcast, @loopback}, &(0x7f0000004340)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004380)={@multicast2, @remote}, &(0x7f00000043c0)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004400)={@multicast1, @remote}, &(0x7f0000004440)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004480)={{{@in=@multicast1, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000004580)=0xe8) accept4(0xffffffffffffffff, &(0x7f0000006980)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000006a00)=0x80, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006a40)={@mcast1}, &(0x7f0000006a80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006ac0)={{{@in6, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000006bc0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006cc0)={{{@in6=@remote, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000006dc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000cf40)={@local, @multicast2}, &(0x7f000000cf80)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000d7c0)={&(0x7f0000000240), 0xc, &(0x7f000000d780)={&(0x7f000000cfc0)={0x14}, 0x14}}, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000080)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000380), 0x8) fcntl$getflags(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000480)=ANY=[], 0x0) pipe2$9p(&(0x7f0000000040), 0x0) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 10:21:23 executing program 4: getcwd(&(0x7f0000000040)=""/188, 0xbc) prctl$setendian(0x14, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/context\x00', 0x2, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/member\x00', 0x2, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) syz_open_dev$binder(&(0x7f00000003c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='mounts\x00') openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000480)) socket$unix(0x1, 0x0, 0x0) inotify_init1(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) eventfd(0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000540)) fcntl$getown(0xffffffffffffffff, 0x9) setpgid(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000380)='vboxnet1:\x00', 0xfffffffffffffffa) keyctl$get_keyring_id(0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000180)='\x00'}, 0x10) creat(&(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a032b6b6a20838386830d30000ff0f183736e33addc422d5f2a68f097002cc9f66410b850f0000006205c7c7f2217c291a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267386bff6767f340a4212dfca50000262666430ffb348b1f7f") ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) 10:21:23 executing program 0: getcwd(&(0x7f0000000040)=""/188, 0xbc) prctl$setendian(0x14, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/context\x00', 0x2, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/member\x00', 0x2, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) syz_open_dev$binder(&(0x7f00000003c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='mounts\x00') openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000480)) socket$unix(0x1, 0x0, 0x0) inotify_init1(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) eventfd(0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000540)) fcntl$getown(0xffffffffffffffff, 0x9) setpgid(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000380)='vboxnet1:\x00', 0xfffffffffffffffa) keyctl$get_keyring_id(0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000180)='\x00'}, 0x10) creat(&(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a032b6b6a20838386830d30000ff0f183736e33addc422d5f2a68f097002cc9f66410b850f0000006205c7c7f2217c291a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267386bff6767f340a4212dfca50000262666430ffb348b1f7f") ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) 10:21:23 executing program 2: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) socket$inet_udplite(0x2, 0x2, 0x88) 10:21:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000980)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") add_key(&(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000006c0)='cifs.spnego\x00', &(0x7f0000000700), &(0x7f0000000740)='/dev/zero\x00', 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000780), &(0x7f00000007c0)=""/195, 0xc3, &(0x7f0000000940)={&(0x7f00000008c0)={'sha256-avx\x00'}, &(0x7f0000000900)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000340)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d00), &(0x7f0000001d40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001d80)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e00)={{{@in6=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000001f00)=0xe8) getresgid(&(0x7f0000001f40), &(0x7f0000001f80), &(0x7f0000001fc0)) getpgid(0x0) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000032c0)) getresuid(&(0x7f0000003300), &(0x7f0000003340), &(0x7f0000003380)) fstat(0xffffffffffffffff, &(0x7f00000033c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003440), &(0x7f0000003480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000034c0)={{{@in=@dev, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000035c0)=0xe8) getgroups(0x0, &(0x7f0000003600)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003640)={{{@in=@multicast2, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000003740)=0xe8) getgroups(0x0, &(0x7f0000003780)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003a40)={{{@in6}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003b40)=0xe8) getegid() getgroups(0x0, &(0x7f0000000140)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000c00)) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003c80)) 10:21:23 executing program 3: getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:21:23 executing program 4: getcwd(&(0x7f0000000040)=""/188, 0xbc) prctl$setendian(0x14, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/context\x00', 0x2, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/member\x00', 0x2, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) syz_open_dev$binder(&(0x7f00000003c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='mounts\x00') openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000480)) socket$unix(0x1, 0x0, 0x0) inotify_init1(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) eventfd(0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000540)) fcntl$getown(0xffffffffffffffff, 0x9) setpgid(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000380)='vboxnet1:\x00', 0xfffffffffffffffa) keyctl$get_keyring_id(0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000180)='\x00'}, 0x10) creat(&(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a032b6b6a20838386830d30000ff0f183736e33addc422d5f2a68f097002cc9f66410b850f0000006205c7c7f2217c291a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267386bff6767f340a4212dfca50000262666430ffb348b1f7f") ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) 10:21:23 executing program 2: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000080)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000001c0)=""/67) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x43}, 0x43) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000500)={0x43}, 0x43) socket$inet(0x2, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000640)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000740)={@multicast1, @broadcast}, &(0x7f0000000780)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000ac0)={@remote, @remote}, &(0x7f0000000b00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b40)={{{@in6=@mcast1, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000000c40)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000d40), &(0x7f0000000d80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000dc0)={'gre0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000e00)={'bcsh0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000e80)={@remote, @multicast1}, &(0x7f0000000ec0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003580)={@mcast2}, &(0x7f00000035c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003600)={{{@in6=@mcast2, @in6=@remote}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000003700)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003740)={'erspan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@local, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003880)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@mcast2}, &(0x7f0000003900)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000003940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0xfffffffffffffc54) accept4$packet(0xffffffffffffffff, &(0x7f0000003b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003b40)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004140)={0x0, @broadcast, @remote}, &(0x7f0000004180)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000041c0)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f00000042c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004300)={0x0, @broadcast, @loopback}, &(0x7f0000004340)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004380)={@multicast2, @remote}, &(0x7f00000043c0)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004400)={@multicast1, @remote}, &(0x7f0000004440)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004480)={{{@in=@multicast1, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000004580)=0xe8) accept4(0xffffffffffffffff, &(0x7f0000006980)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000006a00)=0x80, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006a40)={@mcast1}, &(0x7f0000006a80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006ac0)={{{@in6, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000006bc0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006cc0)={{{@in6=@remote, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000006dc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000cf40)={@local, @multicast2}, &(0x7f000000cf80)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000d7c0)={&(0x7f0000000240), 0xc, &(0x7f000000d780)={&(0x7f000000cfc0)={0x14}, 0x14}}, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000080)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000380), 0x8) fcntl$getflags(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000480)=ANY=[], 0x0) pipe2$9p(&(0x7f0000000040), 0x0) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 10:21:23 executing program 5: getcwd(&(0x7f0000000040)=""/188, 0xbc) prctl$setendian(0x14, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/context\x00', 0x2, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/member\x00', 0x2, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) syz_open_dev$binder(&(0x7f00000003c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='mounts\x00') openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000480)) socket$unix(0x1, 0x0, 0x0) inotify_init1(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) eventfd(0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000540)) fcntl$getown(0xffffffffffffffff, 0x9) setpgid(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000380)='vboxnet1:\x00', 0xfffffffffffffffa) keyctl$get_keyring_id(0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000180)='\x00'}, 0x10) creat(&(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a032b6b6a20838386830d30000ff0f183736e33addc422d5f2a68f097002cc9f66410b850f0000006205c7c7f2217c291a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267386bff6767f340a4212dfca50000262666430ffb348b1f7f") ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) 10:21:23 executing program 3: getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:21:23 executing program 0: getcwd(&(0x7f0000000040)=""/188, 0xbc) prctl$setendian(0x14, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/context\x00', 0x2, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/member\x00', 0x2, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) syz_open_dev$binder(&(0x7f00000003c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='mounts\x00') openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000480)) socket$unix(0x1, 0x0, 0x0) inotify_init1(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) eventfd(0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000540)) fcntl$getown(0xffffffffffffffff, 0x9) setpgid(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000380)='vboxnet1:\x00', 0xfffffffffffffffa) keyctl$get_keyring_id(0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000180)='\x00'}, 0x10) creat(&(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a032b6b6a20838386830d30000ff0f183736e33addc422d5f2a68f097002cc9f66410b850f0000006205c7c7f2217c291a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267386bff6767f340a4212dfca50000262666430ffb348b1f7f") ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) 10:21:24 executing program 1: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000080)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000001c0)=""/67) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x43}, 0x43) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000500)={0x43}, 0x43) socket$inet(0x2, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000640)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000740)={@multicast1, @broadcast}, &(0x7f0000000780)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000ac0)={@remote, @remote}, &(0x7f0000000b00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b40)={{{@in6=@mcast1, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000000c40)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000d40), &(0x7f0000000d80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000dc0)={'gre0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000e00)={'bcsh0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000e80)={@remote, @multicast1}, &(0x7f0000000ec0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003580)={@mcast2}, &(0x7f00000035c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003600)={{{@in6=@mcast2, @in6=@remote}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000003700)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003740)={'erspan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@local, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003880)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@mcast2}, &(0x7f0000003900)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000003940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0xfffffffffffffc54) accept4$packet(0xffffffffffffffff, &(0x7f0000003b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003b40)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004140)={0x0, @broadcast, @remote}, &(0x7f0000004180)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000041c0)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f00000042c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004300)={0x0, @broadcast, @loopback}, &(0x7f0000004340)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004380)={@multicast2, @remote}, &(0x7f00000043c0)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004400)={@multicast1, @remote}, &(0x7f0000004440)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004480)={{{@in=@multicast1, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000004580)=0xe8) accept4(0xffffffffffffffff, &(0x7f0000006980)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000006a00)=0x80, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006a40)={@mcast1}, &(0x7f0000006a80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006ac0)={{{@in6, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000006bc0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006cc0)={{{@in6=@remote, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000006dc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000cf40)={@local, @multicast2}, &(0x7f000000cf80)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000d7c0)={&(0x7f0000000240), 0xc, &(0x7f000000d780)={&(0x7f000000cfc0)={0x14}, 0x14}}, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000080)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000380), 0x8) fcntl$getflags(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000480)=ANY=[], 0x0) pipe2$9p(&(0x7f0000000040), 0x0) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 10:21:24 executing program 4: getcwd(&(0x7f0000000040)=""/188, 0xbc) prctl$setendian(0x14, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/context\x00', 0x2, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/member\x00', 0x2, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) syz_open_dev$binder(&(0x7f00000003c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='mounts\x00') openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000480)) socket$unix(0x1, 0x0, 0x0) inotify_init1(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) eventfd(0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000540)) fcntl$getown(0xffffffffffffffff, 0x9) setpgid(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000380)='vboxnet1:\x00', 0xfffffffffffffffa) keyctl$get_keyring_id(0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000180)='\x00'}, 0x10) creat(&(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a032b6b6a20838386830d30000ff0f183736e33addc422d5f2a68f097002cc9f66410b850f0000006205c7c7f2217c291a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267386bff6767f340a4212dfca50000262666430ffb348b1f7f") ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) 10:21:24 executing program 5: getcwd(&(0x7f0000000040)=""/188, 0xbc) prctl$setendian(0x14, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/context\x00', 0x2, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/member\x00', 0x2, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) syz_open_dev$binder(&(0x7f00000003c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='mounts\x00') openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000480)) socket$unix(0x1, 0x0, 0x0) inotify_init1(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) eventfd(0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000540)) fcntl$getown(0xffffffffffffffff, 0x9) setpgid(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000380)='vboxnet1:\x00', 0xfffffffffffffffa) keyctl$get_keyring_id(0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000180)='\x00'}, 0x10) creat(&(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a032b6b6a20838386830d30000ff0f183736e33addc422d5f2a68f097002cc9f66410b850f0000006205c7c7f2217c291a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267386bff6767f340a4212dfca50000262666430ffb348b1f7f") ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) 10:21:24 executing program 2: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000080)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000001c0)=""/67) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x43}, 0x43) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000500)={0x43}, 0x43) socket$inet(0x2, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000640)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000740)={@multicast1, @broadcast}, &(0x7f0000000780)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000ac0)={@remote, @remote}, &(0x7f0000000b00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b40)={{{@in6=@mcast1, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000000c40)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000d40), &(0x7f0000000d80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000dc0)={'gre0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000e00)={'bcsh0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000e80)={@remote, @multicast1}, &(0x7f0000000ec0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003580)={@mcast2}, &(0x7f00000035c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003600)={{{@in6=@mcast2, @in6=@remote}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000003700)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003740)={'erspan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@local, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003880)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@mcast2}, &(0x7f0000003900)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000003940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0xfffffffffffffc54) accept4$packet(0xffffffffffffffff, &(0x7f0000003b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003b40)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004140)={0x0, @broadcast, @remote}, &(0x7f0000004180)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000041c0)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f00000042c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004300)={0x0, @broadcast, @loopback}, &(0x7f0000004340)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004380)={@multicast2, @remote}, &(0x7f00000043c0)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004400)={@multicast1, @remote}, &(0x7f0000004440)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004480)={{{@in=@multicast1, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000004580)=0xe8) accept4(0xffffffffffffffff, &(0x7f0000006980)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000006a00)=0x80, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006a40)={@mcast1}, &(0x7f0000006a80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006ac0)={{{@in6, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000006bc0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006cc0)={{{@in6=@remote, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000006dc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000cf40)={@local, @multicast2}, &(0x7f000000cf80)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000d7c0)={&(0x7f0000000240), 0xc, &(0x7f000000d780)={&(0x7f000000cfc0)={0x14}, 0x14}}, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000080)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000380), 0x8) fcntl$getflags(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000480)=ANY=[], 0x0) pipe2$9p(&(0x7f0000000040), 0x0) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 10:21:24 executing program 3: getcwd(&(0x7f0000000040)=""/188, 0xbc) prctl$setendian(0x14, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/context\x00', 0x2, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/member\x00', 0x2, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) syz_open_dev$binder(&(0x7f00000003c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='mounts\x00') openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000480)) socket$unix(0x1, 0x0, 0x0) inotify_init1(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) eventfd(0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000540)) fcntl$getown(0xffffffffffffffff, 0x9) setpgid(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000380)='vboxnet1:\x00', 0xfffffffffffffffa) keyctl$get_keyring_id(0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000180)='\x00'}, 0x10) creat(&(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a032b6b6a20838386830d30000ff0f183736e33addc422d5f2a68f097002cc9f66410b850f0000006205c7c7f2217c291a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267386bff6767f340a4212dfca50000262666430ffb348b1f7f") ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) 10:21:24 executing program 0: getpgrp(0x0) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000006c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e092e2edff228523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa66daa50000000066430f55342d0a0000000f0da11b000000010d64ac1e5d31a314b706e2059cfffdfffd") 10:21:25 executing program 4: prctl$setname(0xf, &(0x7f0000000040)='bdevselfcgroupself') gettid() openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000700)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000740)={'nr0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@local, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in6=@remote, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000a80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000ac0), &(0x7f0000000b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000d00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000d40)={{{@in, @in6=@mcast1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000e40)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000e80)={@broadcast, @local}, &(0x7f0000000ec0)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000f00)={@broadcast, @rand_addr}, &(0x7f0000000f40)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe22e26f265ddd6c4c1d9fb61e9") 10:21:25 executing program 5: getcwd(&(0x7f0000000040)=""/188, 0xbc) prctl$setendian(0x14, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/context\x00', 0x2, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/member\x00', 0x2, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) syz_open_dev$binder(&(0x7f00000003c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='mounts\x00') openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000480)) socket$unix(0x1, 0x0, 0x0) inotify_init1(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) eventfd(0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000540)) fcntl$getown(0xffffffffffffffff, 0x9) setpgid(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000380)='vboxnet1:\x00', 0xfffffffffffffffa) keyctl$get_keyring_id(0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000180)='\x00'}, 0x10) creat(&(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a032b6b6a20838386830d30000ff0f183736e33addc422d5f2a68f097002cc9f66410b850f0000006205c7c7f2217c291a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267386bff6767f340a4212dfca50000262666430ffb348b1f7f") ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) 10:21:25 executing program 3: getcwd(&(0x7f0000000040)=""/188, 0xbc) prctl$setendian(0x14, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/context\x00', 0x2, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/member\x00', 0x2, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) syz_open_dev$binder(&(0x7f00000003c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='mounts\x00') openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000480)) socket$unix(0x1, 0x0, 0x0) inotify_init1(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) eventfd(0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000540)) fcntl$getown(0xffffffffffffffff, 0x9) setpgid(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000380)='vboxnet1:\x00', 0xfffffffffffffffa) keyctl$get_keyring_id(0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000180)='\x00'}, 0x10) creat(&(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a032b6b6a20838386830d30000ff0f183736e33addc422d5f2a68f097002cc9f66410b850f0000006205c7c7f2217c291a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267386bff6767f340a4212dfca50000262666430ffb348b1f7f") ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) 10:21:25 executing program 2: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000080)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000001c0)=""/67) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x43}, 0x43) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000500)={0x43}, 0x43) socket$inet(0x2, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000640)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000740)={@multicast1, @broadcast}, &(0x7f0000000780)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000ac0)={@remote, @remote}, &(0x7f0000000b00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b40)={{{@in6=@mcast1, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000000c40)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000d40), &(0x7f0000000d80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000dc0)={'gre0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000e00)={'bcsh0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000e80)={@remote, @multicast1}, &(0x7f0000000ec0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003580)={@mcast2}, &(0x7f00000035c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003600)={{{@in6=@mcast2, @in6=@remote}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000003700)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003740)={'erspan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@local, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003880)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@mcast2}, &(0x7f0000003900)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000003940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0xfffffffffffffc54) accept4$packet(0xffffffffffffffff, &(0x7f0000003b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003b40)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004140)={0x0, @broadcast, @remote}, &(0x7f0000004180)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000041c0)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f00000042c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004300)={0x0, @broadcast, @loopback}, &(0x7f0000004340)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004380)={@multicast2, @remote}, &(0x7f00000043c0)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004400)={@multicast1, @remote}, &(0x7f0000004440)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004480)={{{@in=@multicast1, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000004580)=0xe8) accept4(0xffffffffffffffff, &(0x7f0000006980)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000006a00)=0x80, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006a40)={@mcast1}, &(0x7f0000006a80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006ac0)={{{@in6, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000006bc0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006cc0)={{{@in6=@remote, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000006dc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000cf40)={@local, @multicast2}, &(0x7f000000cf80)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000d7c0)={&(0x7f0000000240), 0xc, &(0x7f000000d780)={&(0x7f000000cfc0)={0x14}, 0x14}}, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000080)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000380), 0x8) fcntl$getflags(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000480)=ANY=[], 0x0) pipe2$9p(&(0x7f0000000040), 0x0) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 10:21:25 executing program 0: getpgrp(0x0) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000006c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e092e2edff228523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa66daa50000000066430f55342d0a0000000f0da11b000000010d64ac1e5d31a314b706e2059cfffdfffd") 10:21:26 executing program 1: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000080)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000001c0)=""/67) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x43}, 0x43) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000500)={0x43}, 0x43) socket$inet(0x2, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000640)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000740)={@multicast1, @broadcast}, &(0x7f0000000780)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000ac0)={@remote, @remote}, &(0x7f0000000b00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b40)={{{@in6=@mcast1, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000000c40)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000d40), &(0x7f0000000d80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000dc0)={'gre0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000e00)={'bcsh0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000e80)={@remote, @multicast1}, &(0x7f0000000ec0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003580)={@mcast2}, &(0x7f00000035c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003600)={{{@in6=@mcast2, @in6=@remote}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000003700)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003740)={'erspan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003780)={{{@in6=@local, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003880)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000038c0)={@mcast2}, &(0x7f0000003900)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000003940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0xfffffffffffffc54) accept4$packet(0xffffffffffffffff, &(0x7f0000003b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003b40)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004140)={0x0, @broadcast, @remote}, &(0x7f0000004180)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000041c0)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f00000042c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004300)={0x0, @broadcast, @loopback}, &(0x7f0000004340)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004380)={@multicast2, @remote}, &(0x7f00000043c0)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004400)={@multicast1, @remote}, &(0x7f0000004440)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004480)={{{@in=@multicast1, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000004580)=0xe8) accept4(0xffffffffffffffff, &(0x7f0000006980)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000006a00)=0x80, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006a40)={@mcast1}, &(0x7f0000006a80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006ac0)={{{@in6, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000006bc0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006cc0)={{{@in6=@remote, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000006dc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000cf40)={@local, @multicast2}, &(0x7f000000cf80)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000d7c0)={&(0x7f0000000240), 0xc, &(0x7f000000d780)={&(0x7f000000cfc0)={0x14}, 0x14}}, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000080)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000380), 0x8) fcntl$getflags(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000480)=ANY=[], 0x0) pipe2$9p(&(0x7f0000000040), 0x0) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 10:21:26 executing program 3: getcwd(&(0x7f0000000040)=""/188, 0xbc) prctl$setendian(0x14, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/context\x00', 0x2, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/member\x00', 0x2, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) syz_open_dev$binder(&(0x7f00000003c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='mounts\x00') openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000480)) socket$unix(0x1, 0x0, 0x0) inotify_init1(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) eventfd(0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000540)) fcntl$getown(0xffffffffffffffff, 0x9) setpgid(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000380)='vboxnet1:\x00', 0xfffffffffffffffa) keyctl$get_keyring_id(0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000180)='\x00'}, 0x10) creat(&(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a032b6b6a20838386830d30000ff0f183736e33addc422d5f2a68f097002cc9f66410b850f0000006205c7c7f2217c291a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267386bff6767f340a4212dfca50000262666430ffb348b1f7f") ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) 10:21:26 executing program 4: prctl$setname(0xf, &(0x7f0000000040)='bdevselfcgroupself') gettid() openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000700)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000740)={'nr0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@local, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in6=@remote, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000a80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000ac0), &(0x7f0000000b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000d00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000d40)={{{@in, @in6=@mcast1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000e40)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000e80)={@broadcast, @local}, &(0x7f0000000ec0)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000f00)={@broadcast, @rand_addr}, &(0x7f0000000f40)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe22e26f265ddd6c4c1d9fb61e9") 10:21:26 executing program 2: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000740)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:21:26 executing program 5: memfd_create(&(0x7f0000000640)="6946813df830007c396fc317236b407c44226e34d42e7cb2d79ac52d7ab3b2c24b5a5d3e9206da56b29d3dd1a2a19e6a3a0b61d01abb6665695a0524c4abea87a5c11f651c6c4ff7b36e3f819847ee23c4d2723562dec0c3c8", 0x1000000ff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") creat(&(0x7f00000004c0)='./file0\x00', 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000600), 0x4) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0), 0x4) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'U+', 0x3}, 0x28, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) getpgid(0x0) setrlimit(0x0, &(0x7f0000000040)) truncate(&(0x7f0000000240)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000500)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), 0xc) memfd_create(&(0x7f00000002c0)='ns/ipc\x00', 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000340)={'eql\x00', {0x2, 0x0, @multicast1}}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) getresuid(&(0x7f0000002d40), &(0x7f0000004080), &(0x7f00000040c0)) fstat(0xffffffffffffff9c, &(0x7f0000004180)) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000005c0)) lstat(&(0x7f0000004200)='./file0\x00', &(0x7f0000004240)) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000006c0)={0x7a, 0x7d, 0x0, {{0x0, 0x64, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xb, 'em1md5sum\\\x00', 0x4, 'eql\x00', 0x5, '[user', 0x1d, '(wlan1ppp0posix_acl_accessem0'}, 0x1, '%'}}, 0x7a) getresgid(&(0x7f0000004380), &(0x7f00000043c0), &(0x7f0000004400)) 10:21:26 executing program 0: getpgrp(0x0) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000006c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e092e2edff228523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa66daa50000000066430f55342d0a0000000f0da11b000000010d64ac1e5d31a314b706e2059cfffdfffd") 10:21:26 executing program 4: prctl$setname(0xf, &(0x7f0000000040)='bdevselfcgroupself') gettid() openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000700)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000740)={'nr0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@local, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in6=@remote, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000a80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000ac0), &(0x7f0000000b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000d00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000d40)={{{@in, @in6=@mcast1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000e40)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000e80)={@broadcast, @local}, &(0x7f0000000ec0)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000f00)={@broadcast, @rand_addr}, &(0x7f0000000f40)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe22e26f265ddd6c4c1d9fb61e9") 10:21:27 executing program 3: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") sync() setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180), 0x4) time(&(0x7f0000000340)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000008c0)=0xfffffffffffffe9e) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000840)={@mcast2}) setrlimit(0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000880)='system.posix_acl_access\x00'}, 0x10) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000a80)='trusted.overlay.origin\x00', &(0x7f0000000ac0)='y\x00', 0x2, 0x0) pipe2(&(0x7f0000000080), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f00000002c0)=0xe8) 10:21:27 executing program 1: socketpair$inet6(0xa, 0x76b905c2bc5a00fd, 0x0, &(0x7f0000000240)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x10) timerfd_create(0x0, 0x0) timer_create(0x0, &(0x7f0000000080), &(0x7f0000000140)) timer_delete(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000180)) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 10:21:27 executing program 2: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000740)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:21:27 executing program 5: memfd_create(&(0x7f0000000640)="6946813df830007c396fc317236b407c44226e34d42e7cb2d79ac52d7ab3b2c24b5a5d3e9206da56b29d3dd1a2a19e6a3a0b61d01abb6665695a0524c4abea87a5c11f651c6c4ff7b36e3f819847ee23c4d2723562dec0c3c8", 0x1000000ff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") creat(&(0x7f00000004c0)='./file0\x00', 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000600), 0x4) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0), 0x4) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'U+', 0x3}, 0x28, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) getpgid(0x0) setrlimit(0x0, &(0x7f0000000040)) truncate(&(0x7f0000000240)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000500)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), 0xc) memfd_create(&(0x7f00000002c0)='ns/ipc\x00', 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000340)={'eql\x00', {0x2, 0x0, @multicast1}}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) getresuid(&(0x7f0000002d40), &(0x7f0000004080), &(0x7f00000040c0)) fstat(0xffffffffffffff9c, &(0x7f0000004180)) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000005c0)) lstat(&(0x7f0000004200)='./file0\x00', &(0x7f0000004240)) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000006c0)={0x7a, 0x7d, 0x0, {{0x0, 0x64, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xb, 'em1md5sum\\\x00', 0x4, 'eql\x00', 0x5, '[user', 0x1d, '(wlan1ppp0posix_acl_accessem0'}, 0x1, '%'}}, 0x7a) getresgid(&(0x7f0000004380), &(0x7f00000043c0), &(0x7f0000004400)) 10:21:27 executing program 0: getpgrp(0x0) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000006c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e092e2edff228523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa66daa50000000066430f55342d0a0000000f0da11b000000010d64ac1e5d31a314b706e2059cfffdfffd") 10:21:27 executing program 4: prctl$setname(0xf, &(0x7f0000000040)='bdevselfcgroupself') gettid() openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000700)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000740)={'nr0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@local, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in6=@remote, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000a80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000ac0), &(0x7f0000000b00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000d00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000d40)={{{@in, @in6=@mcast1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000e40)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000e80)={@broadcast, @local}, &(0x7f0000000ec0)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000f00)={@broadcast, @rand_addr}, &(0x7f0000000f40)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe22e26f265ddd6c4c1d9fb61e9") 10:21:27 executing program 1: socketpair$inet6(0xa, 0x76b905c2bc5a00fd, 0x0, &(0x7f0000000240)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x10) timerfd_create(0x0, 0x0) timer_create(0x0, &(0x7f0000000080), &(0x7f0000000140)) timer_delete(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000180)) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 10:21:27 executing program 1: socketpair$inet6(0xa, 0x76b905c2bc5a00fd, 0x0, &(0x7f0000000240)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x10) timerfd_create(0x0, 0x0) timer_create(0x0, &(0x7f0000000080), &(0x7f0000000140)) timer_delete(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000180)) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 10:21:27 executing program 1: socketpair$inet6(0xa, 0x76b905c2bc5a00fd, 0x0, &(0x7f0000000240)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x10) timerfd_create(0x0, 0x0) timer_create(0x0, &(0x7f0000000080), &(0x7f0000000140)) timer_delete(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000180)) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 10:21:28 executing program 1: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000740)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:21:28 executing program 3: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") sync() setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180), 0x4) time(&(0x7f0000000340)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000008c0)=0xfffffffffffffe9e) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000840)={@mcast2}) setrlimit(0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000880)='system.posix_acl_access\x00'}, 0x10) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000a80)='trusted.overlay.origin\x00', &(0x7f0000000ac0)='y\x00', 0x2, 0x0) pipe2(&(0x7f0000000080), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f00000002c0)=0xe8) 10:21:28 executing program 2: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000740)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:21:28 executing program 5: memfd_create(&(0x7f0000000640)="6946813df830007c396fc317236b407c44226e34d42e7cb2d79ac52d7ab3b2c24b5a5d3e9206da56b29d3dd1a2a19e6a3a0b61d01abb6665695a0524c4abea87a5c11f651c6c4ff7b36e3f819847ee23c4d2723562dec0c3c8", 0x1000000ff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") creat(&(0x7f00000004c0)='./file0\x00', 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000600), 0x4) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0), 0x4) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'U+', 0x3}, 0x28, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) getpgid(0x0) setrlimit(0x0, &(0x7f0000000040)) truncate(&(0x7f0000000240)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000500)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), 0xc) memfd_create(&(0x7f00000002c0)='ns/ipc\x00', 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000340)={'eql\x00', {0x2, 0x0, @multicast1}}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) getresuid(&(0x7f0000002d40), &(0x7f0000004080), &(0x7f00000040c0)) fstat(0xffffffffffffff9c, &(0x7f0000004180)) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000005c0)) lstat(&(0x7f0000004200)='./file0\x00', &(0x7f0000004240)) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000006c0)={0x7a, 0x7d, 0x0, {{0x0, 0x64, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xb, 'em1md5sum\\\x00', 0x4, 'eql\x00', 0x5, '[user', 0x1d, '(wlan1ppp0posix_acl_accessem0'}, 0x1, '%'}}, 0x7a) getresgid(&(0x7f0000004380), &(0x7f00000043c0), &(0x7f0000004400)) 10:21:28 executing program 0: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000d00)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000340)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@local, @in6}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000a00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x0, @rand_addr}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000003680)=0x14) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000e40)=""/4096, 0x1000) syz_execute_func(&(0x7f0000000480)="428055a0266969ef69dc00d9ce41fb0f1837b70f38211ac4c19086d9f28fc9410feefa4e2179fbe5e5417545672e1ac4010d64ac1e5d31a3b7990683e2989f7f") ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:21:28 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_dev$binder(&(0x7f0000001740)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001600)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) [ 434.003652] binder: 17462:17463 ioctl 5429 20001600 returned -22 [ 434.036981] binder: 17462:17463 ioctl 5429 20001600 returned -22 10:21:28 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_dev$binder(&(0x7f0000001740)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001600)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 10:21:28 executing program 0: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000d00)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000340)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@local, @in6}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000a00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x0, @rand_addr}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000003680)=0x14) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000e40)=""/4096, 0x1000) syz_execute_func(&(0x7f0000000480)="428055a0266969ef69dc00d9ce41fb0f1837b70f38211ac4c19086d9f28fc9410feefa4e2179fbe5e5417545672e1ac4010d64ac1e5d31a3b7990683e2989f7f") ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:21:28 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_dev$binder(&(0x7f0000001740)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001600)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) [ 434.124866] binder: 17466:17468 ioctl 5429 20001600 returned -22 [ 434.208102] binder: 17473:17476 ioctl 5429 20001600 returned -22 10:21:28 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_dev$binder(&(0x7f0000001740)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001600)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 10:21:28 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_dev$binder(&(0x7f0000001740)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001600)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) [ 434.298185] binder: 17478:17479 ioctl 5429 20001600 returned -22 10:21:28 executing program 0: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000d00)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000340)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@local, @in6}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000a00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x0, @rand_addr}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000003680)=0x14) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000e40)=""/4096, 0x1000) syz_execute_func(&(0x7f0000000480)="428055a0266969ef69dc00d9ce41fb0f1837b70f38211ac4c19086d9f28fc9410feefa4e2179fbe5e5417545672e1ac4010d64ac1e5d31a3b7990683e2989f7f") ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") [ 434.377927] binder: 17481:17483 ioctl 5429 20001600 returned -22 10:21:28 executing program 1: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000740)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:21:29 executing program 3: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") sync() setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180), 0x4) time(&(0x7f0000000340)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000008c0)=0xfffffffffffffe9e) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000840)={@mcast2}) setrlimit(0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000880)='system.posix_acl_access\x00'}, 0x10) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000a80)='trusted.overlay.origin\x00', &(0x7f0000000ac0)='y\x00', 0x2, 0x0) pipe2(&(0x7f0000000080), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f00000002c0)=0xe8) 10:21:29 executing program 2: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000740)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:21:29 executing program 5: memfd_create(&(0x7f0000000640)="6946813df830007c396fc317236b407c44226e34d42e7cb2d79ac52d7ab3b2c24b5a5d3e9206da56b29d3dd1a2a19e6a3a0b61d01abb6665695a0524c4abea87a5c11f651c6c4ff7b36e3f819847ee23c4d2723562dec0c3c8", 0x1000000ff) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") creat(&(0x7f00000004c0)='./file0\x00', 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000600), 0x4) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0), 0x4) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'U+', 0x3}, 0x28, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) getpgid(0x0) setrlimit(0x0, &(0x7f0000000040)) truncate(&(0x7f0000000240)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000500)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), 0xc) memfd_create(&(0x7f00000002c0)='ns/ipc\x00', 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000340)={'eql\x00', {0x2, 0x0, @multicast1}}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) getresuid(&(0x7f0000002d40), &(0x7f0000004080), &(0x7f00000040c0)) fstat(0xffffffffffffff9c, &(0x7f0000004180)) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000005c0)) lstat(&(0x7f0000004200)='./file0\x00', &(0x7f0000004240)) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000006c0)={0x7a, 0x7d, 0x0, {{0x0, 0x64, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xb, 'em1md5sum\\\x00', 0x4, 'eql\x00', 0x5, '[user', 0x1d, '(wlan1ppp0posix_acl_accessem0'}, 0x1, '%'}}, 0x7a) getresgid(&(0x7f0000004380), &(0x7f00000043c0), &(0x7f0000004400)) 10:21:29 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_dev$binder(&(0x7f0000001740)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001600)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 10:21:29 executing program 0: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000d00)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000340)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@local, @in6}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000a00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x0, @rand_addr}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000003680)=0x14) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000e40)=""/4096, 0x1000) syz_execute_func(&(0x7f0000000480)="428055a0266969ef69dc00d9ce41fb0f1837b70f38211ac4c19086d9f28fc9410feefa4e2179fbe5e5417545672e1ac4010d64ac1e5d31a3b7990683e2989f7f") ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") [ 434.764293] binder: 17503:17507 ioctl 5429 20001600 returned -22 10:21:29 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_dev$binder(&(0x7f0000001740)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001600)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) [ 434.862596] binder: 17512:17513 ioctl 5429 20001600 returned -22 10:21:29 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_dev$binder(&(0x7f0000001740)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001600)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 10:21:29 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_dev$binder(&(0x7f0000001740)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001600)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 10:21:29 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_dev$binder(&(0x7f0000001740)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001600)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) [ 434.955479] binder: 17516:17518 ioctl 5429 20001600 returned -22 10:21:29 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_dev$binder(&(0x7f0000001740)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001600)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) [ 435.013917] binder: 17520:17521 ioctl 5429 20001600 returned -22 [ 435.045273] binder: 17523:17524 ioctl 5429 20001600 returned -22 10:21:29 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_dev$binder(&(0x7f0000001740)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001600)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) [ 435.115329] binder: 17526:17527 ioctl 5429 20001600 returned -22 [ 435.122639] binder: 17529:17530 ioctl 5429 20001600 returned -22 10:21:29 executing program 1: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000740)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:21:29 executing program 3: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") sync() setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180), 0x4) time(&(0x7f0000000340)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000008c0)=0xfffffffffffffe9e) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000840)={@mcast2}) setrlimit(0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000880)='system.posix_acl_access\x00'}, 0x10) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000a80)='trusted.overlay.origin\x00', &(0x7f0000000ac0)='y\x00', 0x2, 0x0) pipe2(&(0x7f0000000080), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f00000002c0)=0xe8) 10:21:29 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_dev$binder(&(0x7f0000001740)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001600)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 10:21:30 executing program 2: request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000280), &(0x7f0000000340)='/dev/rtc0\x00', 0xfffffffffffffffe) pipe2$9p(&(0x7f00000001c0), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000640)={{{@in6, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000780)=0xe8) getgid() geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000940)=ANY=[], 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000040)='keyring\x00', &(0x7f0000000000), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000600)={0x0, @speck128}) syz_open_procfs(0x0, &(0x7f0000000580)='mountstats\x00') setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f00000005c0), 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e58f49080125f237b03c0f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:21:30 executing program 5: clock_gettime(0x5, &(0x7f0000000540)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) pipe(&(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff}, 0xc) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) timer_create(0x0, &(0x7f0000000240), &(0x7f0000000280)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000900)=ANY=[], 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) accept(0xffffffffffffffff, &(0x7f0000000a00)=@ll, &(0x7f0000000800)=0xffba) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000580)={'broute\x00', 0x0, 0x0, 0x84, [], 0x0, &(0x7f0000000380), &(0x7f0000000440)=""/132}, &(0x7f0000000500)=0x78) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080), 0x4) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000200), 0x8) syz_execute_func(&(0x7f0000000680)="42805da0120fef69dc0f01eece73fe67f0f75efbfa0f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:21:30 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_dev$binder(&(0x7f0000001740)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001600)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) [ 435.556771] binder: 17542:17543 ioctl 5429 20001600 returned -22 10:21:30 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) futex(&(0x7f0000004000), 0x400000085, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x401ffffffe) 10:21:30 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_dev$binder(&(0x7f0000001740)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001600)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) [ 435.616376] binder: 17547:17550 ioctl 5429 20001600 returned -22 10:21:30 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_dev$binder(&(0x7f0000001740)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001600)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) [ 435.694362] binder: 17557:17558 ioctl 5429 20001600 returned -22 10:21:30 executing program 5: clock_gettime(0x5, &(0x7f0000000540)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) pipe(&(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff}, 0xc) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) timer_create(0x0, &(0x7f0000000240), &(0x7f0000000280)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000900)=ANY=[], 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) accept(0xffffffffffffffff, &(0x7f0000000a00)=@ll, &(0x7f0000000800)=0xffba) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000580)={'broute\x00', 0x0, 0x0, 0x84, [], 0x0, &(0x7f0000000380), &(0x7f0000000440)=""/132}, &(0x7f0000000500)=0x78) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080), 0x4) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000200), 0x8) syz_execute_func(&(0x7f0000000680)="42805da0120fef69dc0f01eece73fe67f0f75efbfa0f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:21:30 executing program 4: clock_gettime(0x5, &(0x7f0000000540)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) pipe(&(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff}, 0xc) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) timer_create(0x0, &(0x7f0000000240), &(0x7f0000000280)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000900)=ANY=[], 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) accept(0xffffffffffffffff, &(0x7f0000000a00)=@ll, &(0x7f0000000800)=0xffba) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000580)={'broute\x00', 0x0, 0x0, 0x84, [], 0x0, &(0x7f0000000380), &(0x7f0000000440)=""/132}, &(0x7f0000000500)=0x78) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080), 0x4) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000200), 0x8) syz_execute_func(&(0x7f0000000680)="42805da0120fef69dc0f01eece73fe67f0f75efbfa0f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") [ 435.777909] binder: 17562:17563 ioctl 5429 20001600 returned -22 10:21:30 executing program 5: clock_gettime(0x5, &(0x7f0000000540)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) pipe(&(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff}, 0xc) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) timer_create(0x0, &(0x7f0000000240), &(0x7f0000000280)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000900)=ANY=[], 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) accept(0xffffffffffffffff, &(0x7f0000000a00)=@ll, &(0x7f0000000800)=0xffba) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000580)={'broute\x00', 0x0, 0x0, 0x84, [], 0x0, &(0x7f0000000380), &(0x7f0000000440)=""/132}, &(0x7f0000000500)=0x78) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080), 0x4) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000200), 0x8) syz_execute_func(&(0x7f0000000680)="42805da0120fef69dc0f01eece73fe67f0f75efbfa0f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:21:30 executing program 5: clock_gettime(0x5, &(0x7f0000000540)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) pipe(&(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff}, 0xc) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) timer_create(0x0, &(0x7f0000000240), &(0x7f0000000280)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000900)=ANY=[], 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) accept(0xffffffffffffffff, &(0x7f0000000a00)=@ll, &(0x7f0000000800)=0xffba) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000580)={'broute\x00', 0x0, 0x0, 0x84, [], 0x0, &(0x7f0000000380), &(0x7f0000000440)=""/132}, &(0x7f0000000500)=0x78) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080), 0x4) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000200), 0x8) syz_execute_func(&(0x7f0000000680)="42805da0120fef69dc0f01eece73fe67f0f75efbfa0f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:21:30 executing program 5: dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000480)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) getgroups(0x0, &(0x7f0000000500)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='attr/sockcreate\x00') socket$inet6_udp(0xa, 0x2, 0x0) inotify_init1(0x0) socket$inet_tcp(0x2, 0x1, 0x0) epoll_create(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000740)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@multicast2, @in=@loopback}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) dup2(0xffffffffffffff9c, 0xffffffffffffffff) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000940), 0x0) memfd_create(&(0x7f0000000980)=',\x00', 0x0) socket(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/uinput\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in6=@local, @in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000c80)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@remote}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000ec0)=0xe8) getgroups(0x0, &(0x7f0000000f00)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000f40)) perf_event_open$cgroup(&(0x7f0000000f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) accept$inet(0xffffffffffffff9c, &(0x7f0000001000)={0x2, 0x0, @multicast2}, &(0x7f0000001040)=0x10) accept4$inet(0xffffffffffffff9c, &(0x7f0000001080)={0x2, 0x0, @local}, &(0x7f00000010c0)=0x10, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000001140)) socket$netlink(0x10, 0x3, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000003440)={&(0x7f0000003400)='./file0\x00'}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000003500)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005500), 0x0, 0x0, &(0x7f00000055c0)) signalfd(0xffffffffffffff9c, &(0x7f0000005600), 0x8) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000005640)) pipe(&(0x7f0000005680)) getpeername(0xffffffffffffffff, &(0x7f00000056c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000005740)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:21:30 executing program 3: sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000c80)='/selinux/mls\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000ac0)=""/204) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @remote, @multicast2}, &(0x7f0000000340)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@multicast2, @multicast2}, &(0x7f00000009c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000cc0)={{{@in, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@remote, @rand_addr}, &(0x7f0000000a80)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000dc0)={@local}, &(0x7f0000000e00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f80)={{{@in=@dev, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001080)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000010c0)={@loopback}, &(0x7f0000001100)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001140)={0x0, @broadcast, @broadcast}, &(0x7f0000001180)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001200)={0x0, @local, @multicast1}, &(0x7f0000001240)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001340)={{{@in=@local, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001480)={@loopback, @broadcast}, &(0x7f00000014c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001500)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001540)={{{@in6=@local, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000001640)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000016c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001700)={@mcast1}, &(0x7f0000001740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001780)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@mcast2}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000001880)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000018c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001900)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001b40)={'veth0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001bc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001c00)={'tunl0\x00'}) getsockname(0xffffffffffffffff, &(0x7f0000001c40)=@can, &(0x7f0000001cc0)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001fc0)={@multicast1, @multicast2}, &(0x7f0000002000)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002840)={&(0x7f00000000c0), 0xc, &(0x7f0000002800)={&(0x7f0000002040)={0x14}, 0x14}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003cc0)={{{@in6, @in=@local}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000900)=0xe8) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000bc0)) getpid() stat(&(0x7f0000000980)='./file0\x00', &(0x7f0000003dc0)) stat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000003e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006180), &(0x7f00000061c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006200)={{{@in=@dev, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006300)=0xe8) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 10:21:30 executing program 2: request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000280), &(0x7f0000000340)='/dev/rtc0\x00', 0xfffffffffffffffe) pipe2$9p(&(0x7f00000001c0), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000640)={{{@in6, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000780)=0xe8) getgid() geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000940)=ANY=[], 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000040)='keyring\x00', &(0x7f0000000000), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000600)={0x0, @speck128}) syz_open_procfs(0x0, &(0x7f0000000580)='mountstats\x00') setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f00000005c0), 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e58f49080125f237b03c0f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:21:30 executing program 4: clock_gettime(0x5, &(0x7f0000000540)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) pipe(&(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff}, 0xc) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) timer_create(0x0, &(0x7f0000000240), &(0x7f0000000280)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000900)=ANY=[], 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) accept(0xffffffffffffffff, &(0x7f0000000a00)=@ll, &(0x7f0000000800)=0xffba) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000580)={'broute\x00', 0x0, 0x0, 0x84, [], 0x0, &(0x7f0000000380), &(0x7f0000000440)=""/132}, &(0x7f0000000500)=0x78) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080), 0x4) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000200), 0x8) syz_execute_func(&(0x7f0000000680)="42805da0120fef69dc0f01eece73fe67f0f75efbfa0f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:21:30 executing program 1: clock_gettime(0x5, &(0x7f0000000540)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) pipe(&(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff}, 0xc) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) timer_create(0x0, &(0x7f0000000240), &(0x7f0000000280)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000900)=ANY=[], 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) accept(0xffffffffffffffff, &(0x7f0000000a00)=@ll, &(0x7f0000000800)=0xffba) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000580)={'broute\x00', 0x0, 0x0, 0x84, [], 0x0, &(0x7f0000000380), &(0x7f0000000440)=""/132}, &(0x7f0000000500)=0x78) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080), 0x4) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000200), 0x8) syz_execute_func(&(0x7f0000000680)="42805da0120fef69dc0f01eece73fe67f0f75efbfa0f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:21:30 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) futex(&(0x7f0000004000), 0x400000085, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x401ffffffe) 10:21:31 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) futex(&(0x7f0000004000), 0x400000085, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x401ffffffe) 10:21:31 executing program 4: clock_gettime(0x5, &(0x7f0000000540)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) pipe(&(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff}, 0xc) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) timer_create(0x0, &(0x7f0000000240), &(0x7f0000000280)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000900)=ANY=[], 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) accept(0xffffffffffffffff, &(0x7f0000000a00)=@ll, &(0x7f0000000800)=0xffba) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000580)={'broute\x00', 0x0, 0x0, 0x84, [], 0x0, &(0x7f0000000380), &(0x7f0000000440)=""/132}, &(0x7f0000000500)=0x78) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080), 0x4) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000200), 0x8) syz_execute_func(&(0x7f0000000680)="42805da0120fef69dc0f01eece73fe67f0f75efbfa0f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:21:31 executing program 1: clock_gettime(0x5, &(0x7f0000000540)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) pipe(&(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff}, 0xc) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) timer_create(0x0, &(0x7f0000000240), &(0x7f0000000280)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000900)=ANY=[], 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) accept(0xffffffffffffffff, &(0x7f0000000a00)=@ll, &(0x7f0000000800)=0xffba) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000580)={'broute\x00', 0x0, 0x0, 0x84, [], 0x0, &(0x7f0000000380), &(0x7f0000000440)=""/132}, &(0x7f0000000500)=0x78) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080), 0x4) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000200), 0x8) syz_execute_func(&(0x7f0000000680)="42805da0120fef69dc0f01eece73fe67f0f75efbfa0f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:21:31 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) futex(&(0x7f0000004000), 0x400000085, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x401ffffffe) 10:21:31 executing program 4: request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000280), &(0x7f0000000340)='/dev/rtc0\x00', 0xfffffffffffffffe) pipe2$9p(&(0x7f00000001c0), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000640)={{{@in6, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000780)=0xe8) getgid() geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000940)=ANY=[], 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000040)='keyring\x00', &(0x7f0000000000), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000600)={0x0, @speck128}) syz_open_procfs(0x0, &(0x7f0000000580)='mountstats\x00') setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f00000005c0), 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e58f49080125f237b03c0f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:21:31 executing program 1: clock_gettime(0x5, &(0x7f0000000540)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) pipe(&(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff}, 0xc) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) timer_create(0x0, &(0x7f0000000240), &(0x7f0000000280)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000900)=ANY=[], 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) accept(0xffffffffffffffff, &(0x7f0000000a00)=@ll, &(0x7f0000000800)=0xffba) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000580)={'broute\x00', 0x0, 0x0, 0x84, [], 0x0, &(0x7f0000000380), &(0x7f0000000440)=""/132}, &(0x7f0000000500)=0x78) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080), 0x4) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000200), 0x8) syz_execute_func(&(0x7f0000000680)="42805da0120fef69dc0f01eece73fe67f0f75efbfa0f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:21:31 executing program 5: dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000480)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) getgroups(0x0, &(0x7f0000000500)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='attr/sockcreate\x00') socket$inet6_udp(0xa, 0x2, 0x0) inotify_init1(0x0) socket$inet_tcp(0x2, 0x1, 0x0) epoll_create(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000740)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@multicast2, @in=@loopback}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) dup2(0xffffffffffffff9c, 0xffffffffffffffff) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000940), 0x0) memfd_create(&(0x7f0000000980)=',\x00', 0x0) socket(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/uinput\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in6=@local, @in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000c80)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@remote}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000ec0)=0xe8) getgroups(0x0, &(0x7f0000000f00)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000f40)) perf_event_open$cgroup(&(0x7f0000000f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) accept$inet(0xffffffffffffff9c, &(0x7f0000001000)={0x2, 0x0, @multicast2}, &(0x7f0000001040)=0x10) accept4$inet(0xffffffffffffff9c, &(0x7f0000001080)={0x2, 0x0, @local}, &(0x7f00000010c0)=0x10, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000001140)) socket$netlink(0x10, 0x3, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000003440)={&(0x7f0000003400)='./file0\x00'}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000003500)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005500), 0x0, 0x0, &(0x7f00000055c0)) signalfd(0xffffffffffffff9c, &(0x7f0000005600), 0x8) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000005640)) pipe(&(0x7f0000005680)) getpeername(0xffffffffffffffff, &(0x7f00000056c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000005740)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:21:31 executing program 3: sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000c80)='/selinux/mls\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000ac0)=""/204) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @remote, @multicast2}, &(0x7f0000000340)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@multicast2, @multicast2}, &(0x7f00000009c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000cc0)={{{@in, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@remote, @rand_addr}, &(0x7f0000000a80)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000dc0)={@local}, &(0x7f0000000e00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f80)={{{@in=@dev, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001080)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000010c0)={@loopback}, &(0x7f0000001100)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001140)={0x0, @broadcast, @broadcast}, &(0x7f0000001180)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001200)={0x0, @local, @multicast1}, &(0x7f0000001240)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001340)={{{@in=@local, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001480)={@loopback, @broadcast}, &(0x7f00000014c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001500)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001540)={{{@in6=@local, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000001640)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000016c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001700)={@mcast1}, &(0x7f0000001740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001780)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@mcast2}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000001880)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000018c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001900)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001b40)={'veth0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001bc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001c00)={'tunl0\x00'}) getsockname(0xffffffffffffffff, &(0x7f0000001c40)=@can, &(0x7f0000001cc0)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001fc0)={@multicast1, @multicast2}, &(0x7f0000002000)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002840)={&(0x7f00000000c0), 0xc, &(0x7f0000002800)={&(0x7f0000002040)={0x14}, 0x14}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003cc0)={{{@in6, @in=@local}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000900)=0xe8) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000bc0)) getpid() stat(&(0x7f0000000980)='./file0\x00', &(0x7f0000003dc0)) stat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000003e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006180), &(0x7f00000061c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006200)={{{@in=@dev, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006300)=0xe8) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 10:21:31 executing program 2: request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000280), &(0x7f0000000340)='/dev/rtc0\x00', 0xfffffffffffffffe) pipe2$9p(&(0x7f00000001c0), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000640)={{{@in6, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000780)=0xe8) getgid() geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000940)=ANY=[], 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000040)='keyring\x00', &(0x7f0000000000), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000600)={0x0, @speck128}) syz_open_procfs(0x0, &(0x7f0000000580)='mountstats\x00') setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f00000005c0), 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e58f49080125f237b03c0f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:21:31 executing program 1: timerfd_create(0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000380), 0xfffffffffffffda9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000140), 0x4) syz_execute_func(&(0x7f0000000440)="42805da0120fef69dc0f01eecec03b0619fad20e38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae575450f2e1ac4010d64ac1e5d31a3b771fb6443f75b05") openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000004c0), 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) syz_execute_func(&(0x7f0000000340)="45dbf2c4e25bf5cbdfd6676665f2642e47dff1c4437d393800c422fd915c4e00652626660f5fb58aca0000d2e5f00fc12d63c4ab4e430faef2") 10:21:31 executing program 0: dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000480)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) getgroups(0x0, &(0x7f0000000500)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='attr/sockcreate\x00') socket$inet6_udp(0xa, 0x2, 0x0) inotify_init1(0x0) socket$inet_tcp(0x2, 0x1, 0x0) epoll_create(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000740)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@multicast2, @in=@loopback}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) dup2(0xffffffffffffff9c, 0xffffffffffffffff) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000940), 0x0) memfd_create(&(0x7f0000000980)=',\x00', 0x0) socket(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/uinput\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in6=@local, @in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000c80)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@remote}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000ec0)=0xe8) getgroups(0x0, &(0x7f0000000f00)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000f40)) perf_event_open$cgroup(&(0x7f0000000f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) accept$inet(0xffffffffffffff9c, &(0x7f0000001000)={0x2, 0x0, @multicast2}, &(0x7f0000001040)=0x10) accept4$inet(0xffffffffffffff9c, &(0x7f0000001080)={0x2, 0x0, @local}, &(0x7f00000010c0)=0x10, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000001140)) socket$netlink(0x10, 0x3, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000003440)={&(0x7f0000003400)='./file0\x00'}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000003500)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005500), 0x0, 0x0, &(0x7f00000055c0)) signalfd(0xffffffffffffff9c, &(0x7f0000005600), 0x8) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000005640)) pipe(&(0x7f0000005680)) getpeername(0xffffffffffffffff, &(0x7f00000056c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000005740)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:21:32 executing program 1: timerfd_create(0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000380), 0xfffffffffffffda9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000140), 0x4) syz_execute_func(&(0x7f0000000440)="42805da0120fef69dc0f01eecec03b0619fad20e38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae575450f2e1ac4010d64ac1e5d31a3b771fb6443f75b05") openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000004c0), 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) syz_execute_func(&(0x7f0000000340)="45dbf2c4e25bf5cbdfd6676665f2642e47dff1c4437d393800c422fd915c4e00652626660f5fb58aca0000d2e5f00fc12d63c4ab4e430faef2") 10:21:32 executing program 4: request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000280), &(0x7f0000000340)='/dev/rtc0\x00', 0xfffffffffffffffe) pipe2$9p(&(0x7f00000001c0), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000640)={{{@in6, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000780)=0xe8) getgid() geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000940)=ANY=[], 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000040)='keyring\x00', &(0x7f0000000000), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000600)={0x0, @speck128}) syz_open_procfs(0x0, &(0x7f0000000580)='mountstats\x00') setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f00000005c0), 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e58f49080125f237b03c0f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:21:32 executing program 1: timerfd_create(0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000380), 0xfffffffffffffda9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000140), 0x4) syz_execute_func(&(0x7f0000000440)="42805da0120fef69dc0f01eecec03b0619fad20e38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae575450f2e1ac4010d64ac1e5d31a3b771fb6443f75b05") openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000004c0), 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) syz_execute_func(&(0x7f0000000340)="45dbf2c4e25bf5cbdfd6676665f2642e47dff1c4437d393800c422fd915c4e00652626660f5fb58aca0000d2e5f00fc12d63c4ab4e430faef2") 10:21:32 executing program 5: dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000480)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) getgroups(0x0, &(0x7f0000000500)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='attr/sockcreate\x00') socket$inet6_udp(0xa, 0x2, 0x0) inotify_init1(0x0) socket$inet_tcp(0x2, 0x1, 0x0) epoll_create(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000740)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@multicast2, @in=@loopback}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) dup2(0xffffffffffffff9c, 0xffffffffffffffff) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000940), 0x0) memfd_create(&(0x7f0000000980)=',\x00', 0x0) socket(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/uinput\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in6=@local, @in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000c80)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@remote}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000ec0)=0xe8) getgroups(0x0, &(0x7f0000000f00)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000f40)) perf_event_open$cgroup(&(0x7f0000000f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) accept$inet(0xffffffffffffff9c, &(0x7f0000001000)={0x2, 0x0, @multicast2}, &(0x7f0000001040)=0x10) accept4$inet(0xffffffffffffff9c, &(0x7f0000001080)={0x2, 0x0, @local}, &(0x7f00000010c0)=0x10, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000001140)) socket$netlink(0x10, 0x3, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000003440)={&(0x7f0000003400)='./file0\x00'}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000003500)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005500), 0x0, 0x0, &(0x7f00000055c0)) signalfd(0xffffffffffffff9c, &(0x7f0000005600), 0x8) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000005640)) pipe(&(0x7f0000005680)) getpeername(0xffffffffffffffff, &(0x7f00000056c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000005740)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:21:32 executing program 3: sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000c80)='/selinux/mls\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000ac0)=""/204) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @remote, @multicast2}, &(0x7f0000000340)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@multicast2, @multicast2}, &(0x7f00000009c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000cc0)={{{@in, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@remote, @rand_addr}, &(0x7f0000000a80)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000dc0)={@local}, &(0x7f0000000e00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f80)={{{@in=@dev, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001080)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000010c0)={@loopback}, &(0x7f0000001100)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001140)={0x0, @broadcast, @broadcast}, &(0x7f0000001180)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001200)={0x0, @local, @multicast1}, &(0x7f0000001240)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001340)={{{@in=@local, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001480)={@loopback, @broadcast}, &(0x7f00000014c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001500)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001540)={{{@in6=@local, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000001640)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000016c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001700)={@mcast1}, &(0x7f0000001740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001780)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@mcast2}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000001880)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000018c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001900)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001b40)={'veth0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001bc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001c00)={'tunl0\x00'}) getsockname(0xffffffffffffffff, &(0x7f0000001c40)=@can, &(0x7f0000001cc0)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001fc0)={@multicast1, @multicast2}, &(0x7f0000002000)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002840)={&(0x7f00000000c0), 0xc, &(0x7f0000002800)={&(0x7f0000002040)={0x14}, 0x14}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003cc0)={{{@in6, @in=@local}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000900)=0xe8) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000bc0)) getpid() stat(&(0x7f0000000980)='./file0\x00', &(0x7f0000003dc0)) stat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000003e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006180), &(0x7f00000061c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006200)={{{@in=@dev, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006300)=0xe8) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 10:21:32 executing program 0: dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000480)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) getgroups(0x0, &(0x7f0000000500)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='attr/sockcreate\x00') socket$inet6_udp(0xa, 0x2, 0x0) inotify_init1(0x0) socket$inet_tcp(0x2, 0x1, 0x0) epoll_create(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000740)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@multicast2, @in=@loopback}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) dup2(0xffffffffffffff9c, 0xffffffffffffffff) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000940), 0x0) memfd_create(&(0x7f0000000980)=',\x00', 0x0) socket(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/uinput\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in6=@local, @in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000c80)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@remote}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000ec0)=0xe8) getgroups(0x0, &(0x7f0000000f00)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000f40)) perf_event_open$cgroup(&(0x7f0000000f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) accept$inet(0xffffffffffffff9c, &(0x7f0000001000)={0x2, 0x0, @multicast2}, &(0x7f0000001040)=0x10) accept4$inet(0xffffffffffffff9c, &(0x7f0000001080)={0x2, 0x0, @local}, &(0x7f00000010c0)=0x10, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000001140)) socket$netlink(0x10, 0x3, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000003440)={&(0x7f0000003400)='./file0\x00'}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000003500)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005500), 0x0, 0x0, &(0x7f00000055c0)) signalfd(0xffffffffffffff9c, &(0x7f0000005600), 0x8) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000005640)) pipe(&(0x7f0000005680)) getpeername(0xffffffffffffffff, &(0x7f00000056c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000005740)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:21:32 executing program 2: request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000280), &(0x7f0000000340)='/dev/rtc0\x00', 0xfffffffffffffffe) pipe2$9p(&(0x7f00000001c0), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000640)={{{@in6, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000780)=0xe8) getgid() geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000940)=ANY=[], 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000040)='keyring\x00', &(0x7f0000000000), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000600)={0x0, @speck128}) syz_open_procfs(0x0, &(0x7f0000000580)='mountstats\x00') setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f00000005c0), 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e58f49080125f237b03c0f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:21:32 executing program 1: timerfd_create(0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000380), 0xfffffffffffffda9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000140), 0x4) syz_execute_func(&(0x7f0000000440)="42805da0120fef69dc0f01eecec03b0619fad20e38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae575450f2e1ac4010d64ac1e5d31a3b771fb6443f75b05") openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000004c0), 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) syz_execute_func(&(0x7f0000000340)="45dbf2c4e25bf5cbdfd6676665f2642e47dff1c4437d393800c422fd915c4e00652626660f5fb58aca0000d2e5f00fc12d63c4ab4e430faef2") 10:21:32 executing program 4: request_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000280), &(0x7f0000000340)='/dev/rtc0\x00', 0xfffffffffffffffe) pipe2$9p(&(0x7f00000001c0), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000640)={{{@in6, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000780)=0xe8) getgid() geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000940)=ANY=[], 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000040)='keyring\x00', &(0x7f0000000000), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000600)={0x0, @speck128}) syz_open_procfs(0x0, &(0x7f0000000580)='mountstats\x00') setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f00000005c0), 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e58f49080125f237b03c0f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:21:33 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000040)) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x0, &(0x7f0000000080)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x48) getpgid(0xffffffffffffffff) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000300)={0x0, 'bridge_slave_0\x00'}, 0x18) getpid() tgkill(0x0, 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000440)) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000500)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) fstat(0xffffffffffffffff, &(0x7f0000000140)) syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_stats\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 10:21:33 executing program 5: dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000480)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) getgroups(0x0, &(0x7f0000000500)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='attr/sockcreate\x00') socket$inet6_udp(0xa, 0x2, 0x0) inotify_init1(0x0) socket$inet_tcp(0x2, 0x1, 0x0) epoll_create(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000740)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@multicast2, @in=@loopback}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) dup2(0xffffffffffffff9c, 0xffffffffffffffff) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000940), 0x0) memfd_create(&(0x7f0000000980)=',\x00', 0x0) socket(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/uinput\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in6=@local, @in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000c80)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@remote}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000ec0)=0xe8) getgroups(0x0, &(0x7f0000000f00)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000f40)) perf_event_open$cgroup(&(0x7f0000000f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) accept$inet(0xffffffffffffff9c, &(0x7f0000001000)={0x2, 0x0, @multicast2}, &(0x7f0000001040)=0x10) accept4$inet(0xffffffffffffff9c, &(0x7f0000001080)={0x2, 0x0, @local}, &(0x7f00000010c0)=0x10, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000001140)) socket$netlink(0x10, 0x3, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000003440)={&(0x7f0000003400)='./file0\x00'}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000003500)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005500), 0x0, 0x0, &(0x7f00000055c0)) signalfd(0xffffffffffffff9c, &(0x7f0000005600), 0x8) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000005640)) pipe(&(0x7f0000005680)) getpeername(0xffffffffffffffff, &(0x7f00000056c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000005740)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:21:33 executing program 3: sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000c80)='/selinux/mls\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000ac0)=""/204) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @remote, @multicast2}, &(0x7f0000000340)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@multicast2, @multicast2}, &(0x7f00000009c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000cc0)={{{@in, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@remote, @rand_addr}, &(0x7f0000000a80)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000dc0)={@local}, &(0x7f0000000e00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f80)={{{@in=@dev, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001080)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000010c0)={@loopback}, &(0x7f0000001100)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001140)={0x0, @broadcast, @broadcast}, &(0x7f0000001180)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001200)={0x0, @local, @multicast1}, &(0x7f0000001240)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001340)={{{@in=@local, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001440)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001480)={@loopback, @broadcast}, &(0x7f00000014c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001500)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001540)={{{@in6=@local, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000001640)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000016c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001700)={@mcast1}, &(0x7f0000001740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001780)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@mcast2}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000001880)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000018c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001900)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001b40)={'veth0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001bc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001c00)={'tunl0\x00'}) getsockname(0xffffffffffffffff, &(0x7f0000001c40)=@can, &(0x7f0000001cc0)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001fc0)={@multicast1, @multicast2}, &(0x7f0000002000)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002840)={&(0x7f00000000c0), 0xc, &(0x7f0000002800)={&(0x7f0000002040)={0x14}, 0x14}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003cc0)={{{@in6, @in=@local}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000900)=0xe8) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000bc0)) getpid() stat(&(0x7f0000000980)='./file0\x00', &(0x7f0000003dc0)) stat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000003e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006180), &(0x7f00000061c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006200)={{{@in=@dev, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006300)=0xe8) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") [ 438.801798] audit: type=1326 audit(1536920493.254:60): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=17697 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 10:21:33 executing program 0: dup(0xffffffffffffff9c) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000480)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) getgroups(0x0, &(0x7f0000000500)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='attr/sockcreate\x00') socket$inet6_udp(0xa, 0x2, 0x0) inotify_init1(0x0) socket$inet_tcp(0x2, 0x1, 0x0) epoll_create(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000740)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@multicast2, @in=@loopback}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) dup2(0xffffffffffffff9c, 0xffffffffffffffff) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000940), 0x0) memfd_create(&(0x7f0000000980)=',\x00', 0x0) socket(0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/uinput\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in6=@local, @in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000c80)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@remote}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000ec0)=0xe8) getgroups(0x0, &(0x7f0000000f00)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000f40)) perf_event_open$cgroup(&(0x7f0000000f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) accept$inet(0xffffffffffffff9c, &(0x7f0000001000)={0x2, 0x0, @multicast2}, &(0x7f0000001040)=0x10) accept4$inet(0xffffffffffffff9c, &(0x7f0000001080)={0x2, 0x0, @local}, &(0x7f00000010c0)=0x10, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ptmx\x00', 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000001140)) socket$netlink(0x10, 0x3, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000003440)={&(0x7f0000003400)='./file0\x00'}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000003500)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005500), 0x0, 0x0, &(0x7f00000055c0)) signalfd(0xffffffffffffff9c, &(0x7f0000005600), 0x8) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000005640)) pipe(&(0x7f0000005680)) getpeername(0xffffffffffffffff, &(0x7f00000056c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000005740)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:21:33 executing program 2: eventfd(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:21:33 executing program 2: eventfd(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:21:33 executing program 2: eventfd(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:21:33 executing program 4: eventfd(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:21:33 executing program 2: eventfd(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") [ 439.458181] audit: type=1326 audit(1536920493.904:61): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=17697 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 10:21:33 executing program 4: eventfd(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:21:34 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000040)) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x0, &(0x7f0000000080)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x48) getpgid(0xffffffffffffffff) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000300)={0x0, 'bridge_slave_0\x00'}, 0x18) getpid() tgkill(0x0, 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000440)) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000500)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) fstat(0xffffffffffffffff, &(0x7f0000000140)) syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_stats\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 10:21:34 executing program 4: eventfd(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:21:34 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000040)) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x0, &(0x7f0000000080)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x48) getpgid(0xffffffffffffffff) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000300)={0x0, 'bridge_slave_0\x00'}, 0x18) getpid() tgkill(0x0, 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000440)) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000500)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) fstat(0xffffffffffffffff, &(0x7f0000000140)) syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_stats\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 10:21:34 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000140)) io_setup(0x80000000, &(0x7f0000000040)) 10:21:34 executing program 3: openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/checkreqprot\x00', 0x414000, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000005c0)={{}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000080)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000480)=ANY=[], 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000380), 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)}, 0x0) syz_emit_ethernet(0x0, &(0x7f00000027c0)=ANY=[], &(0x7f0000000240)) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x64) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000280)) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x0, 0x0, &(0x7f0000e68000), 0x10) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000001400), 0x0, 0x0, &(0x7f00000014c0)={0x77359400}) pipe2(&(0x7f0000000040), 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000001140)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000d40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000dc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000f00)=0xe8) lstat(&(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) getegid() getpid() getuid() getegid() syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") [ 439.791253] audit: type=1326 audit(1536920494.244:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=17738 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 10:21:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f00009c4ff0)) 10:21:34 executing program 0: getuid() mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000c00)='qnx6\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') creat(&(0x7f0000000c40)='./file0\x00', 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)={@mcast1}, &(0x7f00000000c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @local}, 0x10) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) accept4$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000040)}) accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000240)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000300)) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000480)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000340)={0x9}, 0x9) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f1afb0081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541420f0fa2000000001cc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) fcntl$getown(0xffffffffffffffff, 0x9) [ 439.887505] audit: type=1326 audit(1536920494.334:63): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=17744 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 10:21:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f00009c4ff0)) 10:21:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f00009c4ff0)) 10:21:34 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000140)) io_setup(0x80000000, &(0x7f0000000040)) 10:21:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f00009c4ff0)) 10:21:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f00009c4ff0)) 10:21:34 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000040)) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x0, &(0x7f0000000080)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x48) getpgid(0xffffffffffffffff) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000300)={0x0, 'bridge_slave_0\x00'}, 0x18) getpid() tgkill(0x0, 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000440)) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000500)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) fstat(0xffffffffffffffff, &(0x7f0000000140)) syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_stats\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 10:21:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f00009c4ff0)) 10:21:35 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000040)) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x0, &(0x7f0000000080)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x48) getpgid(0xffffffffffffffff) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000300)={0x0, 'bridge_slave_0\x00'}, 0x18) getpid() tgkill(0x0, 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000440)) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000500)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) fstat(0xffffffffffffffff, &(0x7f0000000140)) syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_stats\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 10:21:35 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000140)) io_setup(0x80000000, &(0x7f0000000040)) [ 440.687789] audit: type=1326 audit(1536920495.134:64): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=17785 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 [ 440.778719] audit: type=1326 audit(1536920495.224:65): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=17794 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 10:21:36 executing program 3: openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/checkreqprot\x00', 0x414000, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000005c0)={{}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000080)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000480)=ANY=[], 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000380), 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)}, 0x0) syz_emit_ethernet(0x0, &(0x7f00000027c0)=ANY=[], &(0x7f0000000240)) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x64) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000280)) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x0, 0x0, &(0x7f0000e68000), 0x10) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000001400), 0x0, 0x0, &(0x7f00000014c0)={0x77359400}) pipe2(&(0x7f0000000040), 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000001140)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000d40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000dc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000f00)=0xe8) lstat(&(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) getegid() getpid() getuid() getegid() syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:21:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f00009c4ff0)) 10:21:36 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000140)) io_setup(0x80000000, &(0x7f0000000040)) 10:21:36 executing program 0: getuid() mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000c00)='qnx6\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') creat(&(0x7f0000000c40)='./file0\x00', 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)={@mcast1}, &(0x7f00000000c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @local}, 0x10) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) accept4$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000040)}) accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000240)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000300)) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000480)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000340)={0x9}, 0x9) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f1afb0081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541420f0fa2000000001cc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) fcntl$getown(0xffffffffffffffff, 0x9) 10:21:36 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000040)) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x0, &(0x7f0000000080)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x48) getpgid(0xffffffffffffffff) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000300)={0x0, 'bridge_slave_0\x00'}, 0x18) getpid() tgkill(0x0, 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000440)) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000500)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) fstat(0xffffffffffffffff, &(0x7f0000000140)) syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_stats\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 10:21:36 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000040)) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x0, &(0x7f0000000080)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x48) getpgid(0xffffffffffffffff) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000300)={0x0, 'bridge_slave_0\x00'}, 0x18) getpid() tgkill(0x0, 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000440)) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000500)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) fstat(0xffffffffffffffff, &(0x7f0000000140)) syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_stats\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 10:21:36 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000340)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in6=@remote, @in6=@local}, {@in=@broadcast}, @in6=@mcast2}}, 0xf0}}, 0x0) gettid() syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) geteuid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000300)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000440)) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000340)) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000380), 0x4) mincore(&(0x7f0000ff4000/0xc000)=nil, 0xc000, &(0x7f0000000700)=""/4096) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000240)={0x8}, 0x8) prctl$setmm(0x23, 0x0, &(0x7f0000ff5000/0x2000)=nil) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000580)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f00000002c0)={0x7}, 0x7) ustat(0x0, &(0x7f0000000200)) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bind$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x10) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000640), 0x12) syz_execute_func(&(0x7f0000000680)="428055a06bb06924a0dc00d99069203637c3397c2a060f38211a1f40a8a5a8a541dfe0400f01ef7d0f2e1a1a01460f36660fd3600931a3b786e2989fc46178ae579b") ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @loopback}, 'bond0\x00'}) 10:21:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0xa, 0x2011, r2, 0x0) 10:21:36 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000340)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in6=@remote, @in6=@local}, {@in=@broadcast}, @in6=@mcast2}}, 0xf0}}, 0x0) gettid() syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) geteuid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000300)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000440)) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000340)) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000380), 0x4) mincore(&(0x7f0000ff4000/0xc000)=nil, 0xc000, &(0x7f0000000700)=""/4096) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000240)={0x8}, 0x8) prctl$setmm(0x23, 0x0, &(0x7f0000ff5000/0x2000)=nil) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000580)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f00000002c0)={0x7}, 0x7) ustat(0x0, &(0x7f0000000200)) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bind$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x10) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000640), 0x12) syz_execute_func(&(0x7f0000000680)="428055a06bb06924a0dc00d99069203637c3397c2a060f38211a1f40a8a5a8a541dfe0400f01ef7d0f2e1a1a01460f36660fd3600931a3b786e2989fc46178ae579b") ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @loopback}, 'bond0\x00'}) 10:21:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0xa, 0x2011, r2, 0x0) [ 441.956743] audit: type=1326 audit(1536920496.404:66): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=17812 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 10:21:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0xa, 0x2011, r2, 0x0) [ 442.052361] audit: type=1326 audit(1536920496.444:67): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=17817 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 10:21:36 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000340)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in6=@remote, @in6=@local}, {@in=@broadcast}, @in6=@mcast2}}, 0xf0}}, 0x0) gettid() syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) geteuid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000300)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000440)) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000340)) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000380), 0x4) mincore(&(0x7f0000ff4000/0xc000)=nil, 0xc000, &(0x7f0000000700)=""/4096) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000240)={0x8}, 0x8) prctl$setmm(0x23, 0x0, &(0x7f0000ff5000/0x2000)=nil) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000580)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f00000002c0)={0x7}, 0x7) ustat(0x0, &(0x7f0000000200)) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bind$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x10) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000640), 0x12) syz_execute_func(&(0x7f0000000680)="428055a06bb06924a0dc00d99069203637c3397c2a060f38211a1f40a8a5a8a541dfe0400f01ef7d0f2e1a1a01460f36660fd3600931a3b786e2989fc46178ae579b") ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @loopback}, 'bond0\x00'}) 10:21:37 executing program 3: openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/checkreqprot\x00', 0x414000, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000005c0)={{}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000080)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000480)=ANY=[], 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000380), 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)}, 0x0) syz_emit_ethernet(0x0, &(0x7f00000027c0)=ANY=[], &(0x7f0000000240)) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x64) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000280)) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x0, 0x0, &(0x7f0000e68000), 0x10) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000001400), 0x0, 0x0, &(0x7f00000014c0)={0x77359400}) pipe2(&(0x7f0000000040), 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000001140)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000d40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000dc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000f00)=0xe8) lstat(&(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) getegid() getpid() getuid() getegid() syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:21:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0xa, 0x2011, r2, 0x0) 10:21:37 executing program 0: getuid() mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000c00)='qnx6\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') creat(&(0x7f0000000c40)='./file0\x00', 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)={@mcast1}, &(0x7f00000000c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @local}, 0x10) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) accept4$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000040)}) accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000240)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000300)) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000480)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000340)={0x9}, 0x9) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f1afb0081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541420f0fa2000000001cc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) fcntl$getown(0xffffffffffffffff, 0x9) 10:21:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0xa, 0x2011, r2, 0x0) 10:21:37 executing program 1: gettid() sched_getscheduler(0x0) memfd_create(&(0x7f0000001480)='/dev/input/mice\x00', 0x0) close(0xffffffffffffffff) getpgid(0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getresgid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@multicast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) getgid() geteuid() getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000d80), 0x0, 0x0) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)) 10:21:37 executing program 4: clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000dc0)) lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000940)) getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) getresgid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getgroups(0x0, &(0x7f0000000cc0)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000740)={{}, 'syz0\x00'}) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000140), &(0x7f00000001c0)=0xc) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000240)="7b5c5ea2707070305b2300"}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000200)=0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000040)=""/183, 0xb7, 0x0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa0f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab276000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000600)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000700)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000680)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000380)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000600)}) linkat(0xffffffffffffffff, &(0x7f0000000880)='./file0\x00', 0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x0) readv(0xffffffffffffffff, &(0x7f0000000700), 0x0) wait4(0x0, &(0x7f0000000340), 0x0, &(0x7f0000000540)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000640)='./file0\x00', 0x0) 10:21:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0xa, 0x2011, r2, 0x0) 10:21:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x5000)=nil, 0x5000, 0xa, 0x2011, r2, 0x0) 10:21:37 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000340)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in6=@remote, @in6=@local}, {@in=@broadcast}, @in6=@mcast2}}, 0xf0}}, 0x0) gettid() syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) geteuid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000300)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000440)) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000340)) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000380), 0x4) mincore(&(0x7f0000ff4000/0xc000)=nil, 0xc000, &(0x7f0000000700)=""/4096) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000240)={0x8}, 0x8) prctl$setmm(0x23, 0x0, &(0x7f0000ff5000/0x2000)=nil) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000580)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f00000002c0)={0x7}, 0x7) ustat(0x0, &(0x7f0000000200)) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bind$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x10) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000640), 0x12) syz_execute_func(&(0x7f0000000680)="428055a06bb06924a0dc00d99069203637c3397c2a060f38211a1f40a8a5a8a541dfe0400f01ef7d0f2e1a1a01460f36660fd3600931a3b786e2989fc46178ae579b") ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @loopback}, 'bond0\x00'}) 10:21:37 executing program 2: ustat(0x6, &(0x7f0000001200)) clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f00000000c0)='\x00'}, 0x30) getpgid(0x0) tgkill(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) clock_gettime(0x0, &(0x7f0000000140)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) arch_prctl(0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, &(0x7f0000fbf000), &(0x7f0000000000), &(0x7f0000000100), &(0x7f00000000c0)) mknod(&(0x7f00000056c0)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000380), &(0x7f00000001c0)) gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f000000d000)) perf_event_open(&(0x7f0000000100)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000008ff8)) getpid() execve(&(0x7f0000000000)='./bus\x00', &(0x7f0000000100), &(0x7f00000002c0)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) tkill(0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001340), 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") 10:21:37 executing program 0: getuid() mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000c00)='qnx6\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') creat(&(0x7f0000000c40)='./file0\x00', 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)={@mcast1}, &(0x7f00000000c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @local}, 0x10) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) accept4$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000040)}) accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000240)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000300)) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000480)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000340)={0x9}, 0x9) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f1afb0081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541420f0fa2000000001cc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) fcntl$getown(0xffffffffffffffff, 0x9) 10:21:38 executing program 4: clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000dc0)) lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000940)) getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) getresgid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getgroups(0x0, &(0x7f0000000cc0)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000740)={{}, 'syz0\x00'}) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000140), &(0x7f00000001c0)=0xc) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000240)="7b5c5ea2707070305b2300"}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000200)=0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000040)=""/183, 0xb7, 0x0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa0f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab276000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000600)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000700)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000680)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000380)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000600)}) linkat(0xffffffffffffffff, &(0x7f0000000880)='./file0\x00', 0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x0) readv(0xffffffffffffffff, &(0x7f0000000700), 0x0) wait4(0x0, &(0x7f0000000340), 0x0, &(0x7f0000000540)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000640)='./file0\x00', 0x0) 10:21:38 executing program 3: openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/checkreqprot\x00', 0x414000, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000005c0)={{}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000080)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000480)=ANY=[], 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000380), 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)}, 0x0) syz_emit_ethernet(0x0, &(0x7f00000027c0)=ANY=[], &(0x7f0000000240)) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x64) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000280)) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x0, 0x0, &(0x7f0000e68000), 0x10) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000001400), 0x0, 0x0, &(0x7f00000014c0)={0x77359400}) pipe2(&(0x7f0000000040), 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000001140)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000d40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000dc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000f00)=0xe8) lstat(&(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) getegid() getpid() getuid() getegid() syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:21:38 executing program 1: gettid() sched_getscheduler(0x0) memfd_create(&(0x7f0000001480)='/dev/input/mice\x00', 0x0) close(0xffffffffffffffff) getpgid(0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getresgid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@multicast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) getgid() geteuid() getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000d80), 0x0, 0x0) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)) 10:21:38 executing program 5: gettid() sched_getscheduler(0x0) memfd_create(&(0x7f0000001480)='/dev/input/mice\x00', 0x0) close(0xffffffffffffffff) getpgid(0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getresgid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@multicast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) getgid() geteuid() getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000d80), 0x0, 0x0) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)) 10:21:38 executing program 0: clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000dc0)) lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000940)) getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) getresgid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getgroups(0x0, &(0x7f0000000cc0)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000740)={{}, 'syz0\x00'}) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000140), &(0x7f00000001c0)=0xc) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000240)="7b5c5ea2707070305b2300"}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000200)=0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000040)=""/183, 0xb7, 0x0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa0f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab276000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000600)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000700)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000680)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000380)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000600)}) linkat(0xffffffffffffffff, &(0x7f0000000880)='./file0\x00', 0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x0) readv(0xffffffffffffffff, &(0x7f0000000700), 0x0) wait4(0x0, &(0x7f0000000340), 0x0, &(0x7f0000000540)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000640)='./file0\x00', 0x0) 10:21:38 executing program 2: ustat(0x6, &(0x7f0000001200)) clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f00000000c0)='\x00'}, 0x30) getpgid(0x0) tgkill(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) clock_gettime(0x0, &(0x7f0000000140)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) arch_prctl(0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, &(0x7f0000fbf000), &(0x7f0000000000), &(0x7f0000000100), &(0x7f00000000c0)) mknod(&(0x7f00000056c0)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000380), &(0x7f00000001c0)) gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f000000d000)) perf_event_open(&(0x7f0000000100)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000008ff8)) getpid() execve(&(0x7f0000000000)='./bus\x00', &(0x7f0000000100), &(0x7f00000002c0)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) tkill(0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001340), 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") 10:21:38 executing program 4: clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000dc0)) lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000940)) getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) getresgid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getgroups(0x0, &(0x7f0000000cc0)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000740)={{}, 'syz0\x00'}) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000140), &(0x7f00000001c0)=0xc) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000240)="7b5c5ea2707070305b2300"}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000200)=0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000040)=""/183, 0xb7, 0x0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa0f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab276000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000600)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000700)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000680)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000380)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000600)}) linkat(0xffffffffffffffff, &(0x7f0000000880)='./file0\x00', 0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x0) readv(0xffffffffffffffff, &(0x7f0000000700), 0x0) wait4(0x0, &(0x7f0000000340), 0x0, &(0x7f0000000540)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000640)='./file0\x00', 0x0) 10:21:39 executing program 0: clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000dc0)) lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000940)) getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) getresgid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getgroups(0x0, &(0x7f0000000cc0)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000740)={{}, 'syz0\x00'}) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000140), &(0x7f00000001c0)=0xc) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000240)="7b5c5ea2707070305b2300"}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000200)=0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000040)=""/183, 0xb7, 0x0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa0f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab276000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000600)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000700)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000680)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000380)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000600)}) linkat(0xffffffffffffffff, &(0x7f0000000880)='./file0\x00', 0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x0) readv(0xffffffffffffffff, &(0x7f0000000700), 0x0) wait4(0x0, &(0x7f0000000340), 0x0, &(0x7f0000000540)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000640)='./file0\x00', 0x0) 10:21:39 executing program 5: gettid() sched_getscheduler(0x0) memfd_create(&(0x7f0000001480)='/dev/input/mice\x00', 0x0) close(0xffffffffffffffff) getpgid(0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getresgid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@multicast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) getgid() geteuid() getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000d80), 0x0, 0x0) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)) 10:21:39 executing program 1: gettid() sched_getscheduler(0x0) memfd_create(&(0x7f0000001480)='/dev/input/mice\x00', 0x0) close(0xffffffffffffffff) getpgid(0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getresgid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@multicast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) getgid() geteuid() getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000d80), 0x0, 0x0) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)) 10:21:39 executing program 4: clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000dc0)) lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000940)) getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) getresgid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getgroups(0x0, &(0x7f0000000cc0)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000740)={{}, 'syz0\x00'}) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000140), &(0x7f00000001c0)=0xc) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000240)="7b5c5ea2707070305b2300"}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000200)=0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000040)=""/183, 0xb7, 0x0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa0f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab276000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000600)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000700)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000680)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000380)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000600)}) linkat(0xffffffffffffffff, &(0x7f0000000880)='./file0\x00', 0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x0) readv(0xffffffffffffffff, &(0x7f0000000700), 0x0) wait4(0x0, &(0x7f0000000340), 0x0, &(0x7f0000000540)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000640)='./file0\x00', 0x0) 10:21:40 executing program 2: ustat(0x6, &(0x7f0000001200)) clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f00000000c0)='\x00'}, 0x30) getpgid(0x0) tgkill(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) clock_gettime(0x0, &(0x7f0000000140)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) arch_prctl(0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, &(0x7f0000fbf000), &(0x7f0000000000), &(0x7f0000000100), &(0x7f00000000c0)) mknod(&(0x7f00000056c0)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000380), &(0x7f00000001c0)) gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f000000d000)) perf_event_open(&(0x7f0000000100)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000008ff8)) getpid() execve(&(0x7f0000000000)='./bus\x00', &(0x7f0000000100), &(0x7f00000002c0)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) tkill(0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001340), 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") 10:21:40 executing program 0: clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000dc0)) lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000940)) getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) getresgid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getgroups(0x0, &(0x7f0000000cc0)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000740)={{}, 'syz0\x00'}) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000140), &(0x7f00000001c0)=0xc) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000240)="7b5c5ea2707070305b2300"}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000200)=0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000040)=""/183, 0xb7, 0x0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa0f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab276000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000600)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000700)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000680)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000380)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000600)}) linkat(0xffffffffffffffff, &(0x7f0000000880)='./file0\x00', 0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x0) readv(0xffffffffffffffff, &(0x7f0000000700), 0x0) wait4(0x0, &(0x7f0000000340), 0x0, &(0x7f0000000540)) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000640)='./file0\x00', 0x0) 10:21:40 executing program 1: gettid() sched_getscheduler(0x0) memfd_create(&(0x7f0000001480)='/dev/input/mice\x00', 0x0) close(0xffffffffffffffff) getpgid(0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getresgid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@multicast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) getgid() geteuid() getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000d80), 0x0, 0x0) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)) 10:21:40 executing program 5: gettid() sched_getscheduler(0x0) memfd_create(&(0x7f0000001480)='/dev/input/mice\x00', 0x0) close(0xffffffffffffffff) getpgid(0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getresgid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@multicast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000009c0)=0xe8) getgid() geteuid() getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000d80), 0x0, 0x0) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000180)) 10:21:40 executing program 3: sysinfo(&(0x7f0000000380)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000a40)) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000001840), 0x4) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f38285230f083170079fbc463fd7998b400ba0000ffff7545dcfb010d64acf65c31a314b706e298987b7f") pipe(&(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000300)) futimesat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000005c0)={{}, {0x0, 0x7530}}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@ipv4={[], [], @rand_addr}, @in6}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000180)=0x127) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000ec0)=0xe8) getpgid(0x0) getresuid(&(0x7f0000001300), &(0x7f0000001340), &(0x7f0000001380)) fstat(0xffffffffffffffff, &(0x7f00000013c0)) 10:21:40 executing program 4: epoll_create(0x5) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000600), 0x0) stat(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000004c0)=""/225, &(0x7f00000005c0)=0xe1) syz_execute_func(&(0x7f0000000240)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socket$unix(0x1, 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="42805da0c60fef69dc0f01eece73fe550fc60079380f38211af3c46178138cd466d12b24c481b5e5bc2b0000002167f00fbab204000000ca6b2179da5ce5417545bde02e1a1a010d64ac1e5d31a3b744dbe271fb0703") 10:21:40 executing program 4: epoll_create(0x5) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000600), 0x0) stat(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000004c0)=""/225, &(0x7f00000005c0)=0xe1) syz_execute_func(&(0x7f0000000240)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socket$unix(0x1, 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="42805da0c60fef69dc0f01eece73fe550fc60079380f38211af3c46178138cd466d12b24c481b5e5bc2b0000002167f00fbab204000000ca6b2179da5ce5417545bde02e1a1a010d64ac1e5d31a3b744dbe271fb0703") 10:21:41 executing program 2: ustat(0x6, &(0x7f0000001200)) clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f00000000c0)='\x00'}, 0x30) getpgid(0x0) tgkill(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) clock_gettime(0x0, &(0x7f0000000140)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) arch_prctl(0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, &(0x7f0000fbf000), &(0x7f0000000000), &(0x7f0000000100), &(0x7f00000000c0)) mknod(&(0x7f00000056c0)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000380), &(0x7f00000001c0)) gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f000000d000)) perf_event_open(&(0x7f0000000100)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000008ff8)) getpid() execve(&(0x7f0000000000)='./bus\x00', &(0x7f0000000100), &(0x7f00000002c0)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) tkill(0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001340), 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") 10:21:41 executing program 4: epoll_create(0x5) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000600), 0x0) stat(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000004c0)=""/225, &(0x7f00000005c0)=0xe1) syz_execute_func(&(0x7f0000000240)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socket$unix(0x1, 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="42805da0c60fef69dc0f01eece73fe550fc60079380f38211af3c46178138cd466d12b24c481b5e5bc2b0000002167f00fbab204000000ca6b2179da5ce5417545bde02e1a1a010d64ac1e5d31a3b744dbe271fb0703") 10:21:41 executing program 0: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/vga_arbiter\x00', 0xffffffffffffff9c}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000340), 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000002c0)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[]}}, 0x0) fdatasync(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @rand_addr}}) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4), 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380), 0x2) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f000031e000), 0x1c) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000002c0)) ftruncate(0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) 10:21:41 executing program 5: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) keyctl$unlink(0x9, r0, r0) 10:21:41 executing program 1: unshare(0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000280)) 10:21:41 executing program 3: sysinfo(&(0x7f0000000380)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000a40)) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000001840), 0x4) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f38285230f083170079fbc463fd7998b400ba0000ffff7545dcfb010d64acf65c31a314b706e298987b7f") pipe(&(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000300)) futimesat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000005c0)={{}, {0x0, 0x7530}}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@ipv4={[], [], @rand_addr}, @in6}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000180)=0x127) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000ec0)=0xe8) getpgid(0x0) getresuid(&(0x7f0000001300), &(0x7f0000001340), &(0x7f0000001380)) fstat(0xffffffffffffffff, &(0x7f00000013c0)) 10:21:41 executing program 4: epoll_create(0x5) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000600), 0x0) stat(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000004c0)=""/225, &(0x7f00000005c0)=0xe1) syz_execute_func(&(0x7f0000000240)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socket$unix(0x1, 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="42805da0c60fef69dc0f01eece73fe550fc60079380f38211af3c46178138cd466d12b24c481b5e5bc2b0000002167f00fbab204000000ca6b2179da5ce5417545bde02e1a1a010d64ac1e5d31a3b744dbe271fb0703") 10:21:41 executing program 4: getrlimit(0x0, &(0x7f0000000140)) mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000c00)='qnx6\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') creat(&(0x7f0000000c40)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280), 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f0000000400), 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002180), &(0x7f00000020c0)=0xc) getpid() fcntl$getown(0xffffffffffffffff, 0x9) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) stat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xffffffffffffff0c) creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000080)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/94) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='bridge0\x00') ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000300)) sysinfo(&(0x7f0000000040)=""/19) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 10:21:42 executing program 5: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) keyctl$unlink(0x9, r0, r0) 10:21:42 executing program 0: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/vga_arbiter\x00', 0xffffffffffffff9c}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000340), 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000002c0)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[]}}, 0x0) fdatasync(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @rand_addr}}) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4), 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380), 0x2) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f000031e000), 0x1c) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000002c0)) ftruncate(0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) 10:21:42 executing program 1: unshare(0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000280)) 10:21:42 executing program 3: sysinfo(&(0x7f0000000380)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000a40)) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000001840), 0x4) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f38285230f083170079fbc463fd7998b400ba0000ffff7545dcfb010d64acf65c31a314b706e298987b7f") pipe(&(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000300)) futimesat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000005c0)={{}, {0x0, 0x7530}}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@ipv4={[], [], @rand_addr}, @in6}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000180)=0x127) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000ec0)=0xe8) getpgid(0x0) getresuid(&(0x7f0000001300), &(0x7f0000001340), &(0x7f0000001380)) fstat(0xffffffffffffffff, &(0x7f00000013c0)) 10:21:42 executing program 5: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) keyctl$unlink(0x9, r0, r0) 10:21:42 executing program 2: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/vga_arbiter\x00', 0xffffffffffffff9c}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000340), 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000002c0)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[]}}, 0x0) fdatasync(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @rand_addr}}) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4), 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380), 0x2) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f000031e000), 0x1c) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000002c0)) ftruncate(0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) 10:21:42 executing program 4: getrlimit(0x0, &(0x7f0000000140)) mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000c00)='qnx6\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') creat(&(0x7f0000000c40)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280), 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f0000000400), 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002180), &(0x7f00000020c0)=0xc) getpid() fcntl$getown(0xffffffffffffffff, 0x9) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) stat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xffffffffffffff0c) creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000080)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/94) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='bridge0\x00') ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000300)) sysinfo(&(0x7f0000000040)=""/19) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 10:21:42 executing program 5: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) keyctl$unlink(0x9, r0, r0) 10:21:43 executing program 0: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/vga_arbiter\x00', 0xffffffffffffff9c}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000340), 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000002c0)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[]}}, 0x0) fdatasync(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @rand_addr}}) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4), 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380), 0x2) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f000031e000), 0x1c) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000002c0)) ftruncate(0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) 10:21:43 executing program 1: unshare(0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000280)) 10:21:43 executing program 3: sysinfo(&(0x7f0000000380)=""/200) prctl$setmm(0x23, 0x0, &(0x7f0000ff8000/0x4000)=nil) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000a40)) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000001840), 0x4) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f38285230f083170079fbc463fd7998b400ba0000ffff7545dcfb010d64acf65c31a314b706e298987b7f") pipe(&(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000300)) futimesat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000005c0)={{}, {0x0, 0x7530}}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@ipv4={[], [], @rand_addr}, @in6}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000180)=0x127) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000ec0)=0xe8) getpgid(0x0) getresuid(&(0x7f0000001300), &(0x7f0000001340), &(0x7f0000001380)) fstat(0xffffffffffffffff, &(0x7f00000013c0)) 10:21:43 executing program 5: getrlimit(0x0, &(0x7f0000000140)) mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000c00)='qnx6\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') creat(&(0x7f0000000c40)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280), 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f0000000400), 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002180), &(0x7f00000020c0)=0xc) getpid() fcntl$getown(0xffffffffffffffff, 0x9) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) stat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xffffffffffffff0c) creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000080)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/94) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='bridge0\x00') ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000300)) sysinfo(&(0x7f0000000040)=""/19) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 10:21:43 executing program 2: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/vga_arbiter\x00', 0xffffffffffffff9c}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000340), 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000002c0)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[]}}, 0x0) fdatasync(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @rand_addr}}) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4), 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380), 0x2) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f000031e000), 0x1c) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000002c0)) ftruncate(0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) 10:21:43 executing program 4: getrlimit(0x0, &(0x7f0000000140)) mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000c00)='qnx6\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') creat(&(0x7f0000000c40)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280), 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f0000000400), 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002180), &(0x7f00000020c0)=0xc) getpid() fcntl$getown(0xffffffffffffffff, 0x9) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) stat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xffffffffffffff0c) creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000080)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/94) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='bridge0\x00') ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000300)) sysinfo(&(0x7f0000000040)=""/19) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 10:21:43 executing program 0: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/vga_arbiter\x00', 0xffffffffffffff9c}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000340), 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000002c0)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[]}}, 0x0) fdatasync(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @rand_addr}}) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4), 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380), 0x2) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f000031e000), 0x1c) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000002c0)) ftruncate(0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) 10:21:44 executing program 1: unshare(0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000280)) 10:21:44 executing program 3: getrlimit(0x0, &(0x7f0000000140)) mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000c00)='qnx6\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') creat(&(0x7f0000000c40)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280), 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f0000000400), 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002180), &(0x7f00000020c0)=0xc) getpid() fcntl$getown(0xffffffffffffffff, 0x9) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) stat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xffffffffffffff0c) creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000080)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/94) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='bridge0\x00') ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000300)) sysinfo(&(0x7f0000000040)=""/19) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 10:21:44 executing program 5: getrlimit(0x0, &(0x7f0000000140)) mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000c00)='qnx6\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') creat(&(0x7f0000000c40)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280), 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f0000000400), 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002180), &(0x7f00000020c0)=0xc) getpid() fcntl$getown(0xffffffffffffffff, 0x9) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) stat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xffffffffffffff0c) creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000080)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/94) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='bridge0\x00') ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000300)) sysinfo(&(0x7f0000000040)=""/19) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 10:21:44 executing program 2: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/vga_arbiter\x00', 0xffffffffffffff9c}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000340), 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000002c0)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[]}}, 0x0) fdatasync(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @rand_addr}}) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4), 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380), 0x2) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f000031e000), 0x1c) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000002c0)) ftruncate(0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) 10:21:44 executing program 4: getrlimit(0x0, &(0x7f0000000140)) mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000c00)='qnx6\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') creat(&(0x7f0000000c40)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280), 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f0000000400), 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002180), &(0x7f00000020c0)=0xc) getpid() fcntl$getown(0xffffffffffffffff, 0x9) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) stat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xffffffffffffff0c) creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000080)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/94) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='bridge0\x00') ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000300)) sysinfo(&(0x7f0000000040)=""/19) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 10:21:44 executing program 0: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/vga_arbiter\x00', 0xffffffffffffff9c}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000340), 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000002c0)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[]}}, 0x0) fdatasync(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @rand_addr}}) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4), 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380), 0x2) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f000031e000), 0x1c) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000002c0)) ftruncate(0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) 10:21:44 executing program 1: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/vga_arbiter\x00', 0xffffffffffffff9c}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000340), 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000002c0)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[]}}, 0x0) fdatasync(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @rand_addr}}) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4), 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380), 0x2) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f000031e000), 0x1c) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000002c0)) ftruncate(0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) 10:21:44 executing program 3: getrlimit(0x0, &(0x7f0000000140)) mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000c00)='qnx6\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') creat(&(0x7f0000000c40)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280), 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f0000000400), 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002180), &(0x7f00000020c0)=0xc) getpid() fcntl$getown(0xffffffffffffffff, 0x9) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) stat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xffffffffffffff0c) creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000080)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/94) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='bridge0\x00') ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000300)) sysinfo(&(0x7f0000000040)=""/19) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 10:21:44 executing program 5: getrlimit(0x0, &(0x7f0000000140)) mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000c00)='qnx6\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') creat(&(0x7f0000000c40)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280), 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f0000000400), 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002180), &(0x7f00000020c0)=0xc) getpid() fcntl$getown(0xffffffffffffffff, 0x9) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) stat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xffffffffffffff0c) creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000080)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/94) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='bridge0\x00') ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000300)) sysinfo(&(0x7f0000000040)=""/19) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 10:21:45 executing program 2: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/vga_arbiter\x00', 0xffffffffffffff9c}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000340), 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000002c0)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[]}}, 0x0) fdatasync(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @rand_addr}}) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4), 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380), 0x2) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f000031e000), 0x1c) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000002c0)) ftruncate(0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) 10:21:45 executing program 4: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) keyctl$unlink(0x9, r0, r0) 10:21:45 executing program 4: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) keyctl$unlink(0x9, r0, r0) 10:21:45 executing program 4: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) keyctl$unlink(0x9, r0, r0) 10:21:45 executing program 0: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/vga_arbiter\x00', 0xffffffffffffff9c}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000340), 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000002c0)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[]}}, 0x0) fdatasync(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @rand_addr}}) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4), 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380), 0x2) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f000031e000), 0x1c) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000002c0)) ftruncate(0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) 10:21:45 executing program 1: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/vga_arbiter\x00', 0xffffffffffffff9c}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000340), 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000002c0)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[]}}, 0x0) fdatasync(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @rand_addr}}) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4), 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380), 0x2) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f000031e000), 0x1c) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000002c0)) ftruncate(0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) 10:21:45 executing program 3: getrlimit(0x0, &(0x7f0000000140)) mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000c00)='qnx6\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') creat(&(0x7f0000000c40)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280), 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000340)='id_resolver\x00', &(0x7f0000000380), &(0x7f0000000400), 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002180), &(0x7f00000020c0)=0xc) getpid() fcntl$getown(0xffffffffffffffff, 0x9) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) stat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xffffffffffffff0c) creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000080)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000500)=""/94) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000002c0)='bridge0\x00') ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000300)) sysinfo(&(0x7f0000000040)=""/19) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 10:21:45 executing program 4: signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/rt6_stats\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000180)='eth0ppp1\x00', 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) lsetxattr$trusted_overlay_origin(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0xfffffffffffffff4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:21:45 executing program 5: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffff8) keyctl$clear(0x7, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) memfd_create(&(0x7f0000000080)='/dev/full\x00', 0x0) getpgid(0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x0) memfd_create(&(0x7f0000000640)="6367726f75702e74687e65c7df4d62", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") syz_open_procfs(0x0, &(0x7f00000012c0)='projid_map\x00') syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 10:21:45 executing program 2: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/vga_arbiter\x00', 0xffffffffffffff9c}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000340), 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000002c0)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[]}}, 0x0) fdatasync(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @rand_addr}}) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4), 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380), 0x2) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f000031e000), 0x1c) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000002c0)) ftruncate(0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) 10:21:45 executing program 5: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffff8) keyctl$clear(0x7, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) memfd_create(&(0x7f0000000080)='/dev/full\x00', 0x0) getpgid(0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x0) memfd_create(&(0x7f0000000640)="6367726f75702e74687e65c7df4d62", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") syz_open_procfs(0x0, &(0x7f00000012c0)='projid_map\x00') syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 10:21:46 executing program 4: signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/rt6_stats\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000180)='eth0ppp1\x00', 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) lsetxattr$trusted_overlay_origin(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0xfffffffffffffff4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:21:46 executing program 5: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffff8) keyctl$clear(0x7, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) memfd_create(&(0x7f0000000080)='/dev/full\x00', 0x0) getpgid(0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x0) memfd_create(&(0x7f0000000640)="6367726f75702e74687e65c7df4d62", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") syz_open_procfs(0x0, &(0x7f00000012c0)='projid_map\x00') syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 10:21:46 executing program 4: signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/rt6_stats\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000180)='eth0ppp1\x00', 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) lsetxattr$trusted_overlay_origin(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0xfffffffffffffff4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:21:46 executing program 5: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffff8) keyctl$clear(0x7, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) memfd_create(&(0x7f0000000080)='/dev/full\x00', 0x0) getpgid(0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x0) memfd_create(&(0x7f0000000640)="6367726f75702e74687e65c7df4d62", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") syz_open_procfs(0x0, &(0x7f00000012c0)='projid_map\x00') syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 10:21:46 executing program 4: signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/rt6_stats\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000180)='eth0ppp1\x00', 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) lsetxattr$trusted_overlay_origin(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0xfffffffffffffff4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:21:46 executing program 0: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/vga_arbiter\x00', 0xffffffffffffff9c}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000340), 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000002c0)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[]}}, 0x0) fdatasync(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @rand_addr}}) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4), 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380), 0x2) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f000031e000), 0x1c) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000002c0)) ftruncate(0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) 10:21:46 executing program 1: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/vga_arbiter\x00', 0xffffffffffffff9c}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000340), 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000002c0)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[]}}, 0x0) fdatasync(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @rand_addr}}) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4), 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380), 0x2) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f000031e000), 0x1c) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000002c0)) ftruncate(0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) 10:21:46 executing program 5: signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/rt6_stats\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000180)='eth0ppp1\x00', 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) lsetxattr$trusted_overlay_origin(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0xfffffffffffffff4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:21:46 executing program 4: clock_getres(0x0, &(0x7f0000000180)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) creat(&(0x7f00000003c0)='./file0\x00', 0x0) inotify_init() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000940)='/selinux/access\x00', 0x2, 0x0) signalfd4(0xffffffffffffff9c, &(0x7f0000000980), 0x8, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000009c0), &(0x7f0000000080)=0xffffffffffffff8c, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000a40)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000dc0)={{{@in=@loopback, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000fc0)) dup2(0xffffffffffffff9c, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() fstat(0xffffffffffffff9c, &(0x7f0000001880)) getegid() syz_open_dev$binder(&(0x7f0000001900)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001940)='/selinux/checkreqprot\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000001980)='/dev/ashmem\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000001a00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000001a40)='/selinux/mls\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/uinput\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ac0)) getresuid(&(0x7f0000001b00), &(0x7f0000001b40), &(0x7f00000000c0)) stat(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000001c80)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001cc0)) openat(0xffffffffffffffff, &(0x7f0000001d40)='./file0/file0\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001d80)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) openat$urandom(0xffffffffffffff9c, &(0x7f0000001e80)='/dev/urandom\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000000380)='./file0/file0\x00'}, 0x10) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000001f40)='/selinux/access\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000001f80), 0x8) perf_event_open$cgroup(&(0x7f0000001fc0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe09500000000c4027dbc8140af0000ee31a3b786e29885c4227992dd289f9f") 10:21:46 executing program 3: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9f2266466d9a10000002041ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") clock_gettime(0x0, &(0x7f0000000400)) recvmmsg(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0, &(0x7f0000004340)) request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000240), &(0x7f00000000c0)="7465716c30000000763c24682727162d", 0xfffffffffffffff8) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000003c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000980)={{{@in=@multicast1, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000a80)=0xe8) sendmsg(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000bc0)}, 0x0) 10:21:46 executing program 2: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000300), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/vga_arbiter\x00', 0xffffffffffffff9c}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000340), 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000002c0)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[]}}, 0x0) fdatasync(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @rand_addr}}) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4), 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380), 0x2) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f000031e000), 0x1c) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000002c0)) ftruncate(0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) 10:21:46 executing program 5: signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/rt6_stats\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000180)='eth0ppp1\x00', 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) lsetxattr$trusted_overlay_origin(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0xfffffffffffffff4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:21:46 executing program 3: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9f2266466d9a10000002041ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") clock_gettime(0x0, &(0x7f0000000400)) recvmmsg(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0, &(0x7f0000004340)) request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000240), &(0x7f00000000c0)="7465716c30000000763c24682727162d", 0xfffffffffffffff8) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000003c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000980)={{{@in=@multicast1, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000a80)=0xe8) sendmsg(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000bc0)}, 0x0) 10:21:46 executing program 5: signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/rt6_stats\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000180)='eth0ppp1\x00', 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) lsetxattr$trusted_overlay_origin(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0xfffffffffffffff4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:21:47 executing program 3: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9f2266466d9a10000002041ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") clock_gettime(0x0, &(0x7f0000000400)) recvmmsg(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0, &(0x7f0000004340)) request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000240), &(0x7f00000000c0)="7465716c30000000763c24682727162d", 0xfffffffffffffff8) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000003c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000980)={{{@in=@multicast1, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000a80)=0xe8) sendmsg(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000bc0)}, 0x0) 10:21:47 executing program 5: sched_setscheduler(0x0, 0x1, &(0x7f0000000140)=0x5) r0 = getpgid(0x0) ptrace$pokeuser(0x6, r0, 0x200, 0x1000) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) r1 = getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="3e0f3805bc9dd2000000f0fe400af14f584f58ef6c640f1fb300000020ce410f18370e1ac481b56d99583c5d5d00c4615ded168f89509b530d") sched_setscheduler(r1, 0x0, &(0x7f0000000200)) 10:21:49 executing program 3: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9f2266466d9a10000002041ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") clock_gettime(0x0, &(0x7f0000000400)) recvmmsg(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0, &(0x7f0000004340)) request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000240), &(0x7f00000000c0)="7465716c30000000763c24682727162d", 0xfffffffffffffff8) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000003c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000980)={{{@in=@multicast1, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000a80)=0xe8) sendmsg(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000bc0)}, 0x0) 10:21:49 executing program 0: socket$unix(0x1, 0x5, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x99, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001280)) getresuid(&(0x7f0000000400), &(0x7f0000000480), &(0x7f0000001340)) getgid() getpgrp(0x0) geteuid() stat(&(0x7f0000001380)='./file0\x00', &(0x7f0000000200)) getpgrp(0x0) geteuid() getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") [ 454.660299] sched: RT throttling activated 10:21:49 executing program 5: sched_setscheduler(0x0, 0x1, &(0x7f0000000140)=0x5) r0 = getpgid(0x0) ptrace$pokeuser(0x6, r0, 0x200, 0x1000) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) r1 = getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="3e0f3805bc9dd2000000f0fe400af14f584f58ef6c640f1fb300000020ce410f18370e1ac481b56d99583c5d5d00c4615ded168f89509b530d") sched_setscheduler(r1, 0x0, &(0x7f0000000200)) 10:21:49 executing program 1: sched_setscheduler(0x0, 0x1, &(0x7f0000000140)=0x5) r0 = getpgid(0x0) ptrace$pokeuser(0x6, r0, 0x200, 0x1000) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) r1 = getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="3e0f3805bc9dd2000000f0fe400af14f584f58ef6c640f1fb300000020ce410f18370e1ac481b56d99583c5d5d00c4615ded168f89509b530d") sched_setscheduler(r1, 0x0, &(0x7f0000000200)) 10:21:52 executing program 4: clock_getres(0x0, &(0x7f0000000180)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) creat(&(0x7f00000003c0)='./file0\x00', 0x0) inotify_init() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000940)='/selinux/access\x00', 0x2, 0x0) signalfd4(0xffffffffffffff9c, &(0x7f0000000980), 0x8, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000009c0), &(0x7f0000000080)=0xffffffffffffff8c, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000a40)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000dc0)={{{@in=@loopback, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000fc0)) dup2(0xffffffffffffff9c, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() fstat(0xffffffffffffff9c, &(0x7f0000001880)) getegid() syz_open_dev$binder(&(0x7f0000001900)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001940)='/selinux/checkreqprot\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000001980)='/dev/ashmem\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000001a00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000001a40)='/selinux/mls\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/uinput\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ac0)) getresuid(&(0x7f0000001b00), &(0x7f0000001b40), &(0x7f00000000c0)) stat(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000001c80)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001cc0)) openat(0xffffffffffffffff, &(0x7f0000001d40)='./file0/file0\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001d80)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) openat$urandom(0xffffffffffffff9c, &(0x7f0000001e80)='/dev/urandom\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000000380)='./file0/file0\x00'}, 0x10) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000001f40)='/selinux/access\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000001f80), 0x8) perf_event_open$cgroup(&(0x7f0000001fc0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe09500000000c4027dbc8140af0000ee31a3b786e29885c4227992dd289f9f") 10:21:52 executing program 2: sched_setscheduler(0x0, 0x1, &(0x7f0000000140)=0x5) r0 = getpgid(0x0) ptrace$pokeuser(0x6, r0, 0x200, 0x1000) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) r1 = getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="3e0f3805bc9dd2000000f0fe400af14f584f58ef6c640f1fb300000020ce410f18370e1ac481b56d99583c5d5d00c4615ded168f89509b530d") sched_setscheduler(r1, 0x0, &(0x7f0000000200)) 10:21:52 executing program 1: sched_setscheduler(0x0, 0x1, &(0x7f0000000140)=0x5) r0 = getpgid(0x0) ptrace$pokeuser(0x6, r0, 0x200, 0x1000) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) r1 = getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="3e0f3805bc9dd2000000f0fe400af14f584f58ef6c640f1fb300000020ce410f18370e1ac481b56d99583c5d5d00c4615ded168f89509b530d") sched_setscheduler(r1, 0x0, &(0x7f0000000200)) 10:21:52 executing program 0: socket$unix(0x1, 0x5, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x99, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001280)) getresuid(&(0x7f0000000400), &(0x7f0000000480), &(0x7f0000001340)) getgid() getpgrp(0x0) geteuid() stat(&(0x7f0000001380)='./file0\x00', &(0x7f0000000200)) getpgrp(0x0) geteuid() getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:21:52 executing program 5: sched_setscheduler(0x0, 0x1, &(0x7f0000000140)=0x5) r0 = getpgid(0x0) ptrace$pokeuser(0x6, r0, 0x200, 0x1000) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) r1 = getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="3e0f3805bc9dd2000000f0fe400af14f584f58ef6c640f1fb300000020ce410f18370e1ac481b56d99583c5d5d00c4615ded168f89509b530d") sched_setscheduler(r1, 0x0, &(0x7f0000000200)) 10:21:54 executing program 3: socket$unix(0x1, 0x5, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x99, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001280)) getresuid(&(0x7f0000000400), &(0x7f0000000480), &(0x7f0000001340)) getgid() getpgrp(0x0) geteuid() stat(&(0x7f0000001380)='./file0\x00', &(0x7f0000000200)) getpgrp(0x0) geteuid() getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:21:55 executing program 2: sched_setscheduler(0x0, 0x1, &(0x7f0000000140)=0x5) r0 = getpgid(0x0) ptrace$pokeuser(0x6, r0, 0x200, 0x1000) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) r1 = getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="3e0f3805bc9dd2000000f0fe400af14f584f58ef6c640f1fb300000020ce410f18370e1ac481b56d99583c5d5d00c4615ded168f89509b530d") sched_setscheduler(r1, 0x0, &(0x7f0000000200)) 10:21:56 executing program 0: socket$unix(0x1, 0x5, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x99, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001280)) getresuid(&(0x7f0000000400), &(0x7f0000000480), &(0x7f0000001340)) getgid() getpgrp(0x0) geteuid() stat(&(0x7f0000001380)='./file0\x00', &(0x7f0000000200)) getpgrp(0x0) geteuid() getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:21:56 executing program 3: socket$unix(0x1, 0x5, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x99, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001280)) getresuid(&(0x7f0000000400), &(0x7f0000000480), &(0x7f0000001340)) getgid() getpgrp(0x0) geteuid() stat(&(0x7f0000001380)='./file0\x00', &(0x7f0000000200)) getpgrp(0x0) geteuid() getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:21:57 executing program 4: clock_getres(0x0, &(0x7f0000000180)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) creat(&(0x7f00000003c0)='./file0\x00', 0x0) inotify_init() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000940)='/selinux/access\x00', 0x2, 0x0) signalfd4(0xffffffffffffff9c, &(0x7f0000000980), 0x8, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000009c0), &(0x7f0000000080)=0xffffffffffffff8c, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000a40)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000dc0)={{{@in=@loopback, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000fc0)) dup2(0xffffffffffffff9c, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() fstat(0xffffffffffffff9c, &(0x7f0000001880)) getegid() syz_open_dev$binder(&(0x7f0000001900)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001940)='/selinux/checkreqprot\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000001980)='/dev/ashmem\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000001a00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000001a40)='/selinux/mls\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/uinput\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ac0)) getresuid(&(0x7f0000001b00), &(0x7f0000001b40), &(0x7f00000000c0)) stat(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000001c80)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001cc0)) openat(0xffffffffffffffff, &(0x7f0000001d40)='./file0/file0\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001d80)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) openat$urandom(0xffffffffffffff9c, &(0x7f0000001e80)='/dev/urandom\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000000380)='./file0/file0\x00'}, 0x10) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000001f40)='/selinux/access\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000001f80), 0x8) perf_event_open$cgroup(&(0x7f0000001fc0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe09500000000c4027dbc8140af0000ee31a3b786e29885c4227992dd289f9f") 10:21:57 executing program 2: sched_setscheduler(0x0, 0x1, &(0x7f0000000140)=0x5) r0 = getpgid(0x0) ptrace$pokeuser(0x6, r0, 0x200, 0x1000) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) r1 = getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="3e0f3805bc9dd2000000f0fe400af14f584f58ef6c640f1fb300000020ce410f18370e1ac481b56d99583c5d5d00c4615ded168f89509b530d") sched_setscheduler(r1, 0x0, &(0x7f0000000200)) 10:21:57 executing program 1: sched_setscheduler(0x0, 0x1, &(0x7f0000000140)=0x5) r0 = getpgid(0x0) ptrace$pokeuser(0x6, r0, 0x200, 0x1000) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) r1 = getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="3e0f3805bc9dd2000000f0fe400af14f584f58ef6c640f1fb300000020ce410f18370e1ac481b56d99583c5d5d00c4615ded168f89509b530d") sched_setscheduler(r1, 0x0, &(0x7f0000000200)) 10:21:58 executing program 5: sched_setscheduler(0x0, 0x1, &(0x7f0000000140)=0x5) r0 = getpgid(0x0) ptrace$pokeuser(0x6, r0, 0x200, 0x1000) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) r1 = getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="3e0f3805bc9dd2000000f0fe400af14f584f58ef6c640f1fb300000020ce410f18370e1ac481b56d99583c5d5d00c4615ded168f89509b530d") sched_setscheduler(r1, 0x0, &(0x7f0000000200)) 10:21:59 executing program 3: socket$unix(0x1, 0x5, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x99, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001280)) getresuid(&(0x7f0000000400), &(0x7f0000000480), &(0x7f0000001340)) getgid() getpgrp(0x0) geteuid() stat(&(0x7f0000001380)='./file0\x00', &(0x7f0000000200)) getpgrp(0x0) geteuid() getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:22:00 executing program 2: socket$unix(0x1, 0x5, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x99, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001280)) getresuid(&(0x7f0000000400), &(0x7f0000000480), &(0x7f0000001340)) getgid() getpgrp(0x0) geteuid() stat(&(0x7f0000001380)='./file0\x00', &(0x7f0000000200)) getpgrp(0x0) geteuid() getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:22:00 executing program 0: socket$unix(0x1, 0x5, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x99, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001280)) getresuid(&(0x7f0000000400), &(0x7f0000000480), &(0x7f0000001340)) getgid() getpgrp(0x0) geteuid() stat(&(0x7f0000001380)='./file0\x00', &(0x7f0000000200)) getpgrp(0x0) geteuid() getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:22:01 executing program 4: clock_getres(0x0, &(0x7f0000000180)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) creat(&(0x7f00000003c0)='./file0\x00', 0x0) inotify_init() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000940)='/selinux/access\x00', 0x2, 0x0) signalfd4(0xffffffffffffff9c, &(0x7f0000000980), 0x8, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000009c0), &(0x7f0000000080)=0xffffffffffffff8c, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000a40)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000dc0)={{{@in=@loopback, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000fc0)) dup2(0xffffffffffffff9c, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() fstat(0xffffffffffffff9c, &(0x7f0000001880)) getegid() syz_open_dev$binder(&(0x7f0000001900)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001940)='/selinux/checkreqprot\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000001980)='/dev/ashmem\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000001a00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000001a40)='/selinux/mls\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/uinput\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ac0)) getresuid(&(0x7f0000001b00), &(0x7f0000001b40), &(0x7f00000000c0)) stat(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000001c80)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001cc0)) openat(0xffffffffffffffff, &(0x7f0000001d40)='./file0/file0\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001d80)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) openat$urandom(0xffffffffffffff9c, &(0x7f0000001e80)='/dev/urandom\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001f00)={&(0x7f0000000380)='./file0/file0\x00'}, 0x10) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000001f40)='/selinux/access\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000001f80), 0x8) perf_event_open$cgroup(&(0x7f0000001fc0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe09500000000c4027dbc8140af0000ee31a3b786e29885c4227992dd289f9f") 10:22:01 executing program 5: socket$unix(0x1, 0x5, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x99, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001280)) getresuid(&(0x7f0000000400), &(0x7f0000000480), &(0x7f0000001340)) getgid() getpgrp(0x0) geteuid() stat(&(0x7f0000001380)='./file0\x00', &(0x7f0000000200)) getpgrp(0x0) geteuid() getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:22:01 executing program 2: socket$unix(0x1, 0x5, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x99, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001280)) getresuid(&(0x7f0000000400), &(0x7f0000000480), &(0x7f0000001340)) getgid() getpgrp(0x0) geteuid() stat(&(0x7f0000001380)='./file0\x00', &(0x7f0000000200)) getpgrp(0x0) geteuid() getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:22:01 executing program 1: sched_setscheduler(0x0, 0x1, &(0x7f0000000140)=0x5) r0 = getpgid(0x0) ptrace$pokeuser(0x6, r0, 0x200, 0x1000) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) r1 = getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="3e0f3805bc9dd2000000f0fe400af14f584f58ef6c640f1fb300000020ce410f18370e1ac481b56d99583c5d5d00c4615ded168f89509b530d") sched_setscheduler(r1, 0x0, &(0x7f0000000200)) 10:22:04 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) setns(r0, 0x0) [ 469.706552] capability: warning: `syz-executor3' uses 32-bit capabilities (legacy support in use) 10:22:04 executing program 1: sched_setscheduler(0x0, 0x1, &(0x7f0000000140)=0x5) r0 = getpgid(0x0) ptrace$pokeuser(0x6, r0, 0x200, 0x1000) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) r1 = getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="3e0f3805bc9dd2000000f0fe400af14f584f58ef6c640f1fb300000020ce410f18370e1ac481b56d99583c5d5d00c4615ded168f89509b530d") sched_setscheduler(r1, 0x0, &(0x7f0000000200)) 10:22:04 executing program 0: socket$unix(0x1, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:22:04 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) setns(r0, 0x0) 10:22:06 executing program 2: socket$unix(0x1, 0x5, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x99, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001280)) getresuid(&(0x7f0000000400), &(0x7f0000000480), &(0x7f0000001340)) getgid() getpgrp(0x0) geteuid() stat(&(0x7f0000001380)='./file0\x00', &(0x7f0000000200)) getpgrp(0x0) geteuid() getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:22:06 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) setns(r0, 0x0) 10:22:07 executing program 5: socket$unix(0x1, 0x5, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x99, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001280)) getresuid(&(0x7f0000000400), &(0x7f0000000480), &(0x7f0000001340)) getgid() getpgrp(0x0) geteuid() stat(&(0x7f0000001380)='./file0\x00', &(0x7f0000000200)) getpgrp(0x0) geteuid() getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:22:07 executing program 0: socket$unix(0x1, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:22:07 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) setns(r0, 0x0) 10:22:07 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) setns(r0, 0x0) 10:22:07 executing program 1: sched_setscheduler(0x0, 0x1, &(0x7f0000000140)=0x5) r0 = getpgid(0x0) ptrace$pokeuser(0x6, r0, 0x200, 0x1000) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) r1 = getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="3e0f3805bc9dd2000000f0fe400af14f584f58ef6c640f1fb300000020ce410f18370e1ac481b56d99583c5d5d00c4615ded168f89509b530d") sched_setscheduler(r1, 0x0, &(0x7f0000000200)) 10:22:09 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) setns(r0, 0x0) 10:22:09 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) setns(r0, 0x0) 10:22:09 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) setns(r0, 0x0) 10:22:09 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="27b9eb2747f4772a177efba0cbeb4b59996f5fce738bac241c4f150ec06f4db484ca17ba4e95a4316036e2d3b9024aa7c38a393bfa0f6dba895f2a2470f30a41d7f0dfdff900431e84861d92555dfced1537c35a313cf065cd75beb3e81adf07473a9c0b3771b0e2e42c5508549025514038786063b642fc4fe123a901b6c8e95b0d9ceaefeeb1d9b68e1b93708b"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000000180)='./control\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) 10:22:09 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003600), 0x0, 0x0, &(0x7f0000003780)={0x77359400}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000003c0)) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000037c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) getresuid(&(0x7f0000000580), &(0x7f0000000640), &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) syz_genetlink_get_family_id$ipvs(&(0x7f00000007c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000780), 0xc, &(0x7f0000000980)={&(0x7f0000000800)={0x14}, 0x14}}, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), 0xc) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000180)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) prctl$setname(0xf, &(0x7f00000005c0)="6264657673656c666367726f757073656c66d94659d7f90b102f20408ff1d14dbb6fef9a0571ecba20d6bc9cc7278a2e997443d7cecafc7fdf935b42aa57df0a5f7e4c9a1f30aac3f8064a1ac6bb78c2365162ec01ef400e2df7e9cedecf15ca49fbf401425454087bf06e7d78") openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000002c0)={0x0, 'bond0\x00'}, 0x18) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000a80)=@nat={'nat\x00', 0x1b, 0x5, 0x408, 0xd0, 0x4a8, 0x2e0, 0x200, 0x2e0, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x5, &(0x7f0000000a00), {[{{@ip={@dev, @rand_addr, 0x0, 0x0, 'dummy0\x00', 'rose0\x00', {}, {0xff}}, 0x0, 0x98, 0xd0}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @local, @remote, @port, @icmp_id}}}}, {{@ip={@rand_addr, @empty, 0x0, 0x0, 'veth0\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv4, @ipv6=@dev, @gre_key}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@multicast1, @ipv6=@mcast2, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv4, @ipv4=@broadcast, @port, @gre_key}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x468) mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f0000000340)={0x0, 0x0, {}, {0x0, 0x0, 0x0, {}, {}, @cond}}) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000001c0), 0x4) write$9p(0xffffffffffffffff, &(0x7f0000000500), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000440)='GPLmime_type/\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x1a, &(0x7f0000000400)=':bdev!eth0[eth1(:(GPLbdev\x00'}, 0x30) lgetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='security.SMACK64MMAP\x00', &(0x7f00000010c0)=""/116, 0x74) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000300)) 10:22:09 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) setns(r0, 0x0) 10:22:09 executing program 5: socket$unix(0x1, 0x5, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x32c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) getuid() getegid() getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x99, &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x97) getgroups(0x0, &(0x7f0000000e00)) getpid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) gettid() geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001280)) getresuid(&(0x7f0000000400), &(0x7f0000000480), &(0x7f0000001340)) getgid() getpgrp(0x0) geteuid() stat(&(0x7f0000001380)='./file0\x00', &(0x7f0000000200)) getpgrp(0x0) geteuid() getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") [ 474.872997] audit: type=1400 audit(1536920529.294:68): avc: denied { map } for pid=18396 comm="syz-executor3" path="/root/syzkaller-testdir173299400/syzkaller.aMUEQs/514/file0/bus" dev="ramfs" ino=54507 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ramfs_t:s0 tclass=file permissive=1 10:22:09 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) setns(r0, 0x0) 10:22:09 executing program 0: socket$unix(0x1, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:22:09 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003600), 0x0, 0x0, &(0x7f0000003780)={0x77359400}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000003c0)) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000037c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) getresuid(&(0x7f0000000580), &(0x7f0000000640), &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) syz_genetlink_get_family_id$ipvs(&(0x7f00000007c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000780), 0xc, &(0x7f0000000980)={&(0x7f0000000800)={0x14}, 0x14}}, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), 0xc) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000180)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) prctl$setname(0xf, &(0x7f00000005c0)="6264657673656c666367726f757073656c66d94659d7f90b102f20408ff1d14dbb6fef9a0571ecba20d6bc9cc7278a2e997443d7cecafc7fdf935b42aa57df0a5f7e4c9a1f30aac3f8064a1ac6bb78c2365162ec01ef400e2df7e9cedecf15ca49fbf401425454087bf06e7d78") openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000002c0)={0x0, 'bond0\x00'}, 0x18) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000a80)=@nat={'nat\x00', 0x1b, 0x5, 0x408, 0xd0, 0x4a8, 0x2e0, 0x200, 0x2e0, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x5, &(0x7f0000000a00), {[{{@ip={@dev, @rand_addr, 0x0, 0x0, 'dummy0\x00', 'rose0\x00', {}, {0xff}}, 0x0, 0x98, 0xd0}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @local, @remote, @port, @icmp_id}}}}, {{@ip={@rand_addr, @empty, 0x0, 0x0, 'veth0\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv4, @ipv6=@dev, @gre_key}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@multicast1, @ipv6=@mcast2, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv4, @ipv4=@broadcast, @port, @gre_key}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x468) mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f0000000340)={0x0, 0x0, {}, {0x0, 0x0, 0x0, {}, {}, @cond}}) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000001c0), 0x4) write$9p(0xffffffffffffffff, &(0x7f0000000500), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000440)='GPLmime_type/\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x1a, &(0x7f0000000400)=':bdev!eth0[eth1(:(GPLbdev\x00'}, 0x30) lgetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='security.SMACK64MMAP\x00', &(0x7f00000010c0)=""/116, 0x74) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000300)) 10:22:10 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="27b9eb2747f4772a177efba0cbeb4b59996f5fce738bac241c4f150ec06f4db484ca17ba4e95a4316036e2d3b9024aa7c38a393bfa0f6dba895f2a2470f30a41d7f0dfdff900431e84861d92555dfced1537c35a313cf065cd75beb3e81adf07473a9c0b3771b0e2e42c5508549025514038786063b642fc4fe123a901b6c8e95b0d9ceaefeeb1d9b68e1b93708b"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000000180)='./control\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) 10:22:10 executing program 0: socket$unix(0x1, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:22:10 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003600), 0x0, 0x0, &(0x7f0000003780)={0x77359400}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000003c0)) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000037c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) getresuid(&(0x7f0000000580), &(0x7f0000000640), &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) syz_genetlink_get_family_id$ipvs(&(0x7f00000007c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000780), 0xc, &(0x7f0000000980)={&(0x7f0000000800)={0x14}, 0x14}}, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), 0xc) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000180)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) prctl$setname(0xf, &(0x7f00000005c0)="6264657673656c666367726f757073656c66d94659d7f90b102f20408ff1d14dbb6fef9a0571ecba20d6bc9cc7278a2e997443d7cecafc7fdf935b42aa57df0a5f7e4c9a1f30aac3f8064a1ac6bb78c2365162ec01ef400e2df7e9cedecf15ca49fbf401425454087bf06e7d78") openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000002c0)={0x0, 'bond0\x00'}, 0x18) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000a80)=@nat={'nat\x00', 0x1b, 0x5, 0x408, 0xd0, 0x4a8, 0x2e0, 0x200, 0x2e0, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x5, &(0x7f0000000a00), {[{{@ip={@dev, @rand_addr, 0x0, 0x0, 'dummy0\x00', 'rose0\x00', {}, {0xff}}, 0x0, 0x98, 0xd0}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @local, @remote, @port, @icmp_id}}}}, {{@ip={@rand_addr, @empty, 0x0, 0x0, 'veth0\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv4, @ipv6=@dev, @gre_key}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@multicast1, @ipv6=@mcast2, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv4, @ipv4=@broadcast, @port, @gre_key}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x468) mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f0000000340)={0x0, 0x0, {}, {0x0, 0x0, 0x0, {}, {}, @cond}}) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000001c0), 0x4) write$9p(0xffffffffffffffff, &(0x7f0000000500), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000440)='GPLmime_type/\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x1a, &(0x7f0000000400)=':bdev!eth0[eth1(:(GPLbdev\x00'}, 0x30) lgetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='security.SMACK64MMAP\x00', &(0x7f00000010c0)=""/116, 0x74) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000300)) 10:22:11 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="27b9eb2747f4772a177efba0cbeb4b59996f5fce738bac241c4f150ec06f4db484ca17ba4e95a4316036e2d3b9024aa7c38a393bfa0f6dba895f2a2470f30a41d7f0dfdff900431e84861d92555dfced1537c35a313cf065cd75beb3e81adf07473a9c0b3771b0e2e42c5508549025514038786063b642fc4fe123a901b6c8e95b0d9ceaefeeb1d9b68e1b93708b"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000000180)='./control\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) 10:22:11 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003600), 0x0, 0x0, &(0x7f0000003780)={0x77359400}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000003c0)) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000037c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) getresuid(&(0x7f0000000580), &(0x7f0000000640), &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) syz_genetlink_get_family_id$ipvs(&(0x7f00000007c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000780), 0xc, &(0x7f0000000980)={&(0x7f0000000800)={0x14}, 0x14}}, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), 0xc) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000180)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) prctl$setname(0xf, &(0x7f00000005c0)="6264657673656c666367726f757073656c66d94659d7f90b102f20408ff1d14dbb6fef9a0571ecba20d6bc9cc7278a2e997443d7cecafc7fdf935b42aa57df0a5f7e4c9a1f30aac3f8064a1ac6bb78c2365162ec01ef400e2df7e9cedecf15ca49fbf401425454087bf06e7d78") openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000002c0)={0x0, 'bond0\x00'}, 0x18) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000a80)=@nat={'nat\x00', 0x1b, 0x5, 0x408, 0xd0, 0x4a8, 0x2e0, 0x200, 0x2e0, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x5, &(0x7f0000000a00), {[{{@ip={@dev, @rand_addr, 0x0, 0x0, 'dummy0\x00', 'rose0\x00', {}, {0xff}}, 0x0, 0x98, 0xd0}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @local, @remote, @port, @icmp_id}}}}, {{@ip={@rand_addr, @empty, 0x0, 0x0, 'veth0\x00', 'gretap0\x00'}, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv4, @ipv6=@dev, @gre_key}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@multicast1, @ipv6=@mcast2, @icmp_id, @gre_key}}}, {{@uncond, 0x0, 0x98, 0xe0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv4, @ipv4=@broadcast, @port, @gre_key}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x468) mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f0000000340)={0x0, 0x0, {}, {0x0, 0x0, 0x0, {}, {}, @cond}}) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000001c0), 0x4) write$9p(0xffffffffffffffff, &(0x7f0000000500), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000440)='GPLmime_type/\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x1a, &(0x7f0000000400)=':bdev!eth0[eth1(:(GPLbdev\x00'}, 0x30) lgetxattr(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)=@known='security.SMACK64MMAP\x00', &(0x7f00000010c0)=""/116, 0x74) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000300)) 10:22:11 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="27b9eb2747f4772a177efba0cbeb4b59996f5fce738bac241c4f150ec06f4db484ca17ba4e95a4316036e2d3b9024aa7c38a393bfa0f6dba895f2a2470f30a41d7f0dfdff900431e84861d92555dfced1537c35a313cf065cd75beb3e81adf07473a9c0b3771b0e2e42c5508549025514038786063b642fc4fe123a901b6c8e95b0d9ceaefeeb1d9b68e1b93708b"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000000180)='./control\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) 10:22:12 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="27b9eb2747f4772a177efba0cbeb4b59996f5fce738bac241c4f150ec06f4db484ca17ba4e95a4316036e2d3b9024aa7c38a393bfa0f6dba895f2a2470f30a41d7f0dfdff900431e84861d92555dfced1537c35a313cf065cd75beb3e81adf07473a9c0b3771b0e2e42c5508549025514038786063b642fc4fe123a901b6c8e95b0d9ceaefeeb1d9b68e1b93708b"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000000180)='./control\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes 10:22:12 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="27b9eb2747f4772a177efba0cbeb4b59996f5fce738bac241c4f150ec06f4db484ca17ba4e95a4316036e2d3b9024aa7c38a393bfa0f6dba895f2a2470f30a41d7f0dfdff900431e84861d92555dfced1537c35a313cf065cd75beb3e81adf07473a9c0b3771b0e2e42c5508549025514038786063b642fc4fe123a901b6c8e95b0d9ceaefeeb1d9b68e1b93708b"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000000180)='./control\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) 10:22:13 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="27b9eb2747f4772a177efba0cbeb4b59996f5fce738bac241c4f150ec06f4db484ca17ba4e95a4316036e2d3b9024aa7c38a393bfa0f6dba895f2a2470f30a41d7f0dfdff900431e84861d92555dfced1537c35a313cf065cd75beb3e81adf07473a9c0b3771b0e2e42c5508549025514038786063b642fc4fe123a901b6c8e95b0d9ceaefeeb1d9b68e1b93708b"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000000180)='./control\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) 10:23:11 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="27b9eb2747f4772a177efba0cbeb4b59996f5fce738bac241c4f150ec06f4db484ca17ba4e95a4316036e2d3b9024aa7c38a393bfa0f6dba895f2a2470f30a41d7f0dfdff900431e84861d92555dfced1537c35a313cf065cd75beb3e81adf07473a9c0b3771b0e2e42c5508549025514038786063b642fc4fe123a901b6c8e95b0d9ceaefeeb1d9b68e1b93708b"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000000180)='./control\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) 10:23:11 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="27b9eb2747f4772a177efba0cbeb4b59996f5fce738bac241c4f150ec06f4db484ca17ba4e95a4316036e2d3b9024aa7c38a393bfa0f6dba895f2a2470f30a41d7f0dfdff900431e84861d92555dfced1537c35a313cf065cd75beb3e81adf07473a9c0b3771b0e2e42c5508549025514038786063b642fc4fe123a901b6c8e95b0d9ceaefeeb1d9b68e1b93708b"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000000180)='./control\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) 10:23:11 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="27b9eb2747f4772a177efba0cbeb4b59996f5fce738bac241c4f150ec06f4db484ca17ba4e95a4316036e2d3b9024aa7c38a393bfa0f6dba895f2a2470f30a41d7f0dfdff900431e84861d92555dfced1537c35a313cf065cd75beb3e81adf07473a9c0b3771b0e2e42c5508549025514038786063b642fc4fe123a901b6c8e95b0d9ceaefeeb1d9b68e1b93708b"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000000180)='./control\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) 10:23:11 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="27b9eb2747f4772a177efba0cbeb4b59996f5fce738bac241c4f150ec06f4db484ca17ba4e95a4316036e2d3b9024aa7c38a393bfa0f6dba895f2a2470f30a41d7f0dfdff900431e84861d92555dfced1537c35a313cf065cd75beb3e81adf07473a9c0b3771b0e2e42c5508549025514038786063b642fc4fe123a901b6c8e95b0d9ceaefeeb1d9b68e1b93708b"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000000180)='./control\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) 10:23:11 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="27b9eb2747f4772a177efba0cbeb4b59996f5fce738bac241c4f150ec06f4db484ca17ba4e95a4316036e2d3b9024aa7c38a393bfa0f6dba895f2a2470f30a41d7f0dfdff900431e84861d92555dfced1537c35a313cf065cd75beb3e81adf07473a9c0b3771b0e2e42c5508549025514038786063b642fc4fe123a901b6c8e95b0d9ceaefeeb1d9b68e1b93708b"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000000180)='./control\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) 10:23:11 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="27b9eb2747f4772a177efba0cbeb4b59996f5fce738bac241c4f150ec06f4db484ca17ba4e95a4316036e2d3b9024aa7c38a393bfa0f6dba895f2a2470f30a41d7f0dfdff900431e84861d92555dfced1537c35a313cf065cd75beb3e81adf07473a9c0b3771b0e2e42c5508549025514038786063b642fc4fe123a901b6c8e95b0d9ceaefeeb1d9b68e1b93708b"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000000180)='./control\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) 10:23:11 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="27b9eb2747f4772a177efba0cbeb4b59996f5fce738bac241c4f150ec06f4db484ca17ba4e95a4316036e2d3b9024aa7c38a393bfa0f6dba895f2a2470f30a41d7f0dfdff900431e84861d92555dfced1537c35a313cf065cd75beb3e81adf07473a9c0b3771b0e2e42c5508549025514038786063b642fc4fe123a901b6c8e95b0d9ceaefeeb1d9b68e1b93708b"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000000180)='./control\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) 10:23:11 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="27b9eb2747f4772a177efba0cbeb4b59996f5fce738bac241c4f150ec06f4db484ca17ba4e95a4316036e2d3b9024aa7c38a393bfa0f6dba895f2a2470f30a41d7f0dfdff900431e84861d92555dfced1537c35a313cf065cd75beb3e81adf07473a9c0b3771b0e2e42c5508549025514038786063b642fc4fe123a901b6c8e95b0d9ceaefeeb1d9b68e1b93708b"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000000180)='./control\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) 10:23:12 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="27b9eb2747f4772a177efba0cbeb4b59996f5fce738bac241c4f150ec06f4db484ca17ba4e95a4316036e2d3b9024aa7c38a393bfa0f6dba895f2a2470f30a41d7f0dfdff900431e84861d92555dfced1537c35a313cf065cd75beb3e81adf07473a9c0b3771b0e2e42c5508549025514038786063b642fc4fe123a901b6c8e95b0d9ceaefeeb1d9b68e1b93708b"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000000180)='./control\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) 10:23:12 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="27b9eb2747f4772a177efba0cbeb4b59996f5fce738bac241c4f150ec06f4db484ca17ba4e95a4316036e2d3b9024aa7c38a393bfa0f6dba895f2a2470f30a41d7f0dfdff900431e84861d92555dfced1537c35a313cf065cd75beb3e81adf07473a9c0b3771b0e2e42c5508549025514038786063b642fc4fe123a901b6c8e95b0d9ceaefeeb1d9b68e1b93708b"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000000180)='./control\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) 10:23:12 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="27b9eb2747f4772a177efba0cbeb4b59996f5fce738bac241c4f150ec06f4db484ca17ba4e95a4316036e2d3b9024aa7c38a393bfa0f6dba895f2a2470f30a41d7f0dfdff900431e84861d92555dfced1537c35a313cf065cd75beb3e81adf07473a9c0b3771b0e2e42c5508549025514038786063b642fc4fe123a901b6c8e95b0d9ceaefeeb1d9b68e1b93708b"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000000180)='./control\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) 10:23:12 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="27b9eb2747f4772a177efba0cbeb4b59996f5fce738bac241c4f150ec06f4db484ca17ba4e95a4316036e2d3b9024aa7c38a393bfa0f6dba895f2a2470f30a41d7f0dfdff900431e84861d92555dfced1537c35a313cf065cd75beb3e81adf07473a9c0b3771b0e2e42c5508549025514038786063b642fc4fe123a901b6c8e95b0d9ceaefeeb1d9b68e1b93708b"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) symlink(&(0x7f0000004000)='./file0\x00', &(0x7f0000000180)='./control\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) 10:23:33 executing program 5: capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) prctl$seccomp(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 10:23:33 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) 10:23:33 executing program 3: rt_sigtimedwait(&(0x7f0000000340), &(0x7f0000000400), &(0x7f0000000480), 0x8) keyctl$set_reqkey_keyring(0x4, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) getpgrp(0x0) prctl$getname(0x10, &(0x7f0000000200)=""/103) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000700)=0xe8) sendto$packet(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x14) getpgrp(0x0) getpriority(0x0, 0x0) 10:23:33 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x1f, 0x0, 0x2, 0x100000001, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 10:23:33 executing program 5: capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) prctl$seccomp(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 10:23:33 executing program 5: capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) prctl$seccomp(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 10:23:33 executing program 5: capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) prctl$seccomp(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 10:23:33 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x1f, 0x0, 0x2, 0x100000001, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 10:23:33 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) 10:23:33 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x1f, 0x0, 0x2, 0x100000001, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 10:23:33 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) 10:23:34 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x1f, 0x0, 0x2, 0x100000001, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 10:23:34 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) 10:23:34 executing program 3: rt_sigtimedwait(&(0x7f0000000340), &(0x7f0000000400), &(0x7f0000000480), 0x8) keyctl$set_reqkey_keyring(0x4, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) getpgrp(0x0) prctl$getname(0x10, &(0x7f0000000200)=""/103) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000700)=0xe8) sendto$packet(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x14) getpgrp(0x0) getpriority(0x0, 0x0) 10:23:35 executing program 3: rt_sigtimedwait(&(0x7f0000000340), &(0x7f0000000400), &(0x7f0000000480), 0x8) keyctl$set_reqkey_keyring(0x4, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) getpgrp(0x0) prctl$getname(0x10, &(0x7f0000000200)=""/103) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000700)=0xe8) sendto$packet(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x14) getpgrp(0x0) getpriority(0x0, 0x0) 10:23:35 executing program 3: rt_sigtimedwait(&(0x7f0000000340), &(0x7f0000000400), &(0x7f0000000480), 0x8) keyctl$set_reqkey_keyring(0x4, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) getpgrp(0x0) prctl$getname(0x10, &(0x7f0000000200)=""/103) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000700)=0xe8) sendto$packet(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x14) getpgrp(0x0) getpriority(0x0, 0x0) [ 691.750036] INFO: rcu_preempt detected stalls on CPUs/tasks: [ 691.755881] (detected by 0, t=10502 jiffies, g=17406, c=17405, q=43) [ 691.762453] All QSes seen, last rcu_preempt kthread activity 85 (4295006471-4295006386), jiffies_till_next_fqs=1, root ->qsmask 0x0 [ 691.774399] swapper/0 R running task 28384 0 0 0x80000000 [ 691.781621] Call Trace: [ 691.784189] [ 691.786331] sched_show_task.cold.32+0x342/0x3c0 [ 691.791081] rcu_check_callbacks.cold.56+0xcf3/0xd99 [ 691.796187] ? tick_sched_handle.isra.8+0x150/0x150 [ 691.801188] update_process_times+0x24/0x60 [ 691.805684] tick_sched_handle.isra.8+0x73/0x150 [ 691.810427] tick_sched_timer+0x7e/0x160 [ 691.814477] __hrtimer_run_queues+0x2d0/0xc10 [ 691.818971] ? hrtimer_start_range_ns+0x1070/0x1070 [ 691.823973] ? ktime_get_update_offsets_now+0x241/0x300 [ 691.829334] hrtimer_interrupt+0x19a/0x440 [ 691.833572] smp_apic_timer_interrupt+0x13a/0x5f0 [ 691.838403] apic_timer_interrupt+0x84/0x90 [ 691.842706] [ 691.844929] RIP: 0010:native_safe_halt+0x2/0x10 [ 691.849576] RSP: 0000:ffffffff8b807d28 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff10 [ 691.857278] RAX: 0000000000000007 RBX: ffffffff8bc28348 RCX: 0000000000000000 [ 691.864534] RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffffffff8b82ca2c [ 691.871794] RBP: ffffffff8bc32768 R08: 0000000000000001 R09: 0000000000000000 [ 691.879049] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 691.886307] R13: 1ffffffff1700fae R14: 0000000000000000 R15: ffffffff8bc32824 [ 691.893589] default_idle+0x50/0x380 [ 691.897293] do_idle+0x2da/0x3b0 [ 691.900647] ? arch_cpu_idle_exit+0x40/0x40 [ 691.904963] cpu_startup_entry+0xc9/0xe0 [ 691.909007] ? cpu_in_idle+0x20/0x20 [ 691.912707] ? preempt_count_add+0x7d/0x130 [ 691.917020] ? trace_event_define_fields_x86_irq_vector+0x28/0x28 [ 691.923241] start_kernel+0x6fb/0x739 [ 691.927031] ? mem_encrypt_init+0x5/0x5 [ 691.931000] ? memcpy_orig+0x16/0x110 [ 691.934815] secondary_startup_64+0xa5/0xb0 10:25:46 executing program 4: rt_sigtimedwait(&(0x7f0000000340), &(0x7f0000000400), &(0x7f0000000480), 0x8) keyctl$set_reqkey_keyring(0x4, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) getpgrp(0x0) prctl$getname(0x10, &(0x7f0000000200)=""/103) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000700)=0xe8) sendto$packet(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x14) getpgrp(0x0) getpriority(0x0, 0x0) 10:25:46 executing program 2: munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) add_key$user(&(0x7f0000000580)='user\x00', &(0x7f0000000640), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9) geteuid() dup2(0xffffffffffffffff, 0xffffffffffffff9c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) fstat(0xffffffffffffffff, &(0x7f00000002c0)) keyctl$chown(0x4, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000004c0)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:25:46 executing program 0: set_tid_address(&(0x7f0000000040)) lsetxattr$trusted_overlay_origin(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)) 10:25:46 executing program 5: io_setup(0x5, &(0x7f00000001c0)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"0000000000000000000000000200", 0x20000005001}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000080)={0x0, 0x0, 0x400000}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={&(0x7f0000000240), 0xc, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000080), 0x14d}]) 10:25:46 executing program 3: io_setup(0x1, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000380)}, &(0x7f0000000500)) clock_getres(0x0, &(0x7f00000001c0)) ustat(0x0, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000280), 0x4) syz_open_procfs(0x0, &(0x7f0000000400)='net/arp\x00') ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) eventfd(0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0xffffffffffffff1a, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:25:46 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000300)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000f80)=0x14) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000fc0)={0x0, @remote, @loopback}, 0xc) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) clock_getres(0x0, &(0x7f0000000040)) pipe(&(0x7f0000000200)) getrusage(0x0, &(0x7f0000000240)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000001540)=ANY=[], &(0x7f0000000540)=""/4096, 0x0, 0x1000}, 0x20) socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') clock_gettime(0x0, &(0x7f0000000340)) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @dev, @local}, &(0x7f0000001580)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000015c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001600)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001680)=0x14) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) accept4$packet(0xffffffffffffffff, &(0x7f00000016c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001700)=0x14, 0x0) 10:25:46 executing program 3: io_setup(0x1, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000380)}, &(0x7f0000000500)) clock_getres(0x0, &(0x7f00000001c0)) ustat(0x0, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000280), 0x4) syz_open_procfs(0x0, &(0x7f0000000400)='net/arp\x00') ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) eventfd(0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0xffffffffffffff1a, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:25:46 executing program 1: clock_gettime(0x7, &(0x7f0000000880)) openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000500)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000280)=""/116) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$get_persistent(0x16, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f00000000c0)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, 0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000480)) munlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f00000007c0)) add_key(&(0x7f0000000980)='logon\x00', &(0x7f00000009c0), &(0x7f0000000a00), 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) write$selinux_context(0xffffffffffffffff, &(0x7f0000000840)='system_u:object_r:logrotate_var_lib_t:s0\x00', 0x29) request_key(&(0x7f0000000540)='trusted\x00', &(0x7f0000000440), &(0x7f00000004c0)='@\x00', 0xfffffffffffffff8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000008c0)=""/182, &(0x7f0000000240)=0xb6) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000380)={0x18}, 0x18) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:25:46 executing program 3: io_setup(0x1, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000380)}, &(0x7f0000000500)) clock_getres(0x0, &(0x7f00000001c0)) ustat(0x0, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000280), 0x4) syz_open_procfs(0x0, &(0x7f0000000400)='net/arp\x00') ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) eventfd(0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0xffffffffffffff1a, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:25:47 executing program 3: io_setup(0x1, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000380)}, &(0x7f0000000500)) clock_getres(0x0, &(0x7f00000001c0)) ustat(0x0, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000280), 0x4) syz_open_procfs(0x0, &(0x7f0000000400)='net/arp\x00') ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) eventfd(0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0xffffffffffffff1a, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:25:47 executing program 3: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) accept4$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000440), 0x0) accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000600)) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000004c0)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000540)={0x2, 0x0, @dev}, &(0x7f0000000580)=0x10, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000005c0)={'bridge0\x00'}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) syz_open_procfs(0x0, &(0x7f0000000500)='net/fib_triestat\x00') epoll_create1(0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000001100)='trusted.overlay.origin\x00', &(0x7f0000000480)='y\x00', 0x2, 0x0) getgroups(0x0, &(0x7f0000000000)) setregid(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000200)=""/70, 0x46}) preadv(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000780)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f00000008c0)=0xe8) 10:25:47 executing program 0: set_tid_address(&(0x7f0000000040)) lsetxattr$trusted_overlay_origin(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)) 10:25:47 executing program 4: rt_sigtimedwait(&(0x7f0000000340), &(0x7f0000000400), &(0x7f0000000480), 0x8) keyctl$set_reqkey_keyring(0x4, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) getpgrp(0x0) prctl$getname(0x10, &(0x7f0000000200)=""/103) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@multicast1, @in=@local}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000700)=0xe8) sendto$packet(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x14) getpgrp(0x0) getpriority(0x0, 0x0) 10:25:47 executing program 2: munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) add_key$user(&(0x7f0000000580)='user\x00', &(0x7f0000000640), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9) geteuid() dup2(0xffffffffffffffff, 0xffffffffffffff9c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) fstat(0xffffffffffffffff, &(0x7f00000002c0)) keyctl$chown(0x4, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000004c0)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:25:47 executing program 1: clock_gettime(0x7, &(0x7f0000000880)) openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000500)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000280)=""/116) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$get_persistent(0x16, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f00000000c0)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, 0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000480)) munlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f00000007c0)) add_key(&(0x7f0000000980)='logon\x00', &(0x7f00000009c0), &(0x7f0000000a00), 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000800)='/dev/full\x00', 0x0, 0x0) write$selinux_context(0xffffffffffffffff, &(0x7f0000000840)='system_u:object_r:logrotate_var_lib_t:s0\x00', 0x29) request_key(&(0x7f0000000540)='trusted\x00', &(0x7f0000000440), &(0x7f00000004c0)='@\x00', 0xfffffffffffffff8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000008c0)=""/182, &(0x7f0000000240)=0xb6) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000380)={0x18}, 0x18) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703")