\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="db00000000000000"], @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}, 0x0) 00:24:00 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="5300000044a6aeabec2e0200170000000014150800006d00ffefffffff7f010040000000000000006e99ec00000000b8188e23061291cdaf72dd9a0000000000000e590849d92a873dd3531e60c02e2e5feb992c457e9791"], 0x58) [ 229.489960] jfs: Unrecognized mount option "usr?uota" or missing value 00:24:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x6) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x10000, 0x4) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x2000000000c, &(0x7f0000000400), &(0x7f0000000000)=0x4) [ 229.580975] jfs: Unrecognized mount option "usr?uota" or missing value 00:24:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r0, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000380), &(0x7f00000000c0)=""/33}, 0x18) socket$kcm(0x29, 0x5, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0xa00, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000100)={{0x0, @broadcast, 0x4e23, 0x3, 'lblcr\x00', 0x2d, 0x2, 0x28}, {@rand_addr=0x2, 0x4e24, 0x2000, 0x88, 0x1ff, 0x1}}, 0x44) 00:24:01 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, r1, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x87}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40}, 0x14) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000001800)={0x7, &(0x7f0000000240)=""/108, &(0x7f0000001740)=[{0x6, 0xf1, 0x9, &(0x7f00000002c0)=""/241}, {0x9, 0xf9, 0x49, &(0x7f00000003c0)=""/249}, {0x685, 0x7a, 0x4, &(0x7f00000004c0)=""/122}, {0xfff, 0x9f, 0xfffffffffffffc00, &(0x7f0000000540)=""/159}, {0x3f, 0x1000, 0x4, &(0x7f0000000600)=""/4096}, {0xca, 0x3, 0x29d, &(0x7f0000001600)=""/3}, {0x9, 0xca, 0x3, &(0x7f0000001640)=""/202}]}) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r2 = getuid() setfsuid(r2) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r2}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:01 executing program 1: socket$vsock_dgram(0x28, 0x2, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x1, 0x3fffc) socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x0, 0x549080) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000040)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0xbd, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000001140)='/dev/kvm\x00', 0x0, 0x0) 00:24:01 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) prctl$getreaper(0xb, &(0x7f0000000000)) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000600)={{0x2, 0x0, @local}, {0x0, @local}, 0x8, {0x2, 0x0, @rand_addr}, "0000000500000000723000"}) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x8, {0x2, 0x0, @remote}}) 00:24:01 executing program 0: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002c80)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) gettid() ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000002cc0)={0x830a, 0x0, 0x6fff8, 0x4, 0x0, 0x6e371b8c}) bind$vsock_dgram(r1, &(0x7f00000028c0)={0x28, 0x0, 0x0, @host}, 0x10) socket(0x1b, 0x7, 0x99bb857) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000002bc0)={0x0, 'bond_slave_1\x00', 0x2}, 0x18) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000002500), &(0x7f0000002780)=0x4) shmget(0xffffffffffffffff, 0x3000, 0x78000441, &(0x7f0000ffc000/0x3000)=nil) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000140)) syz_mount_image$nfs4(&(0x7f00000002c0)='nfs4\x00', &(0x7f0000002740)='./file0\x00', 0x40, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000002ac0)="74086e750000000000000000008c00") 00:24:01 executing program 5: syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0xc85f4f6e941a913f, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0x8, 0x8, 0x20, 0xfffffffffffffffd, 0x8, 0x1, 0x9f, 0x7, 0x0, 0x7}) 00:24:01 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00', 0x200002, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$setown(r0, 0x8, r1) r2 = openat$cgroup_int(r0, &(0x7f0000000680)='cpuset.cpu_exclusive\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$cgroup_ro(r0, &(0x7f0000000140)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) sendfile(r2, r5, &(0x7f0000000240), 0xfe7) ioctl$LOOP_SET_FD(r5, 0x4c00, r3) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200000, 0x4) 00:24:01 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0xde, &(0x7f0000000980), 0x0, &(0x7f0000000100)}, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000180)=""/43, &(0x7f0000000140)=0x2b) r0 = semget(0x3, 0x4, 0x210) semctl$SEM_INFO(r0, 0x0, 0x13, &(0x7f0000000040)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0xfffffeb3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r1, &(0x7f0000000000)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000340)="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") 00:24:01 executing program 4: r0 = syz_open_dev$binder(&(0x7f00000006c0)='/dev/binder#\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) memfd_create(&(0x7f00000000c0)='-vboxnet1\x00', 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) mmap(&(0x7f0000010000/0x4000)=nil, 0x4000, 0x0, 0x20011, r1, 0x0) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000380)={0x7f}, &(0x7f0000000400), &(0x7f0000000480)={&(0x7f0000000440), 0x8}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0x2, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\fc'], 0x0, 0x0, &(0x7f00000004c0)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x14, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="116303e15f6908cffee272299009000000d1f04de5b08d9234d38a000000000000e3ffffffffffffff73eeb4b78ebb9ecc85ce9dea0da75540068c25eadacbfa449ba0966ea33156e6cf636d9ef09328a92c30f5d6c32cebfa5907d9ac551d29a53c061a5e7cb700e2a601b6d2c9", @ANYRES64=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0xffffff48, 0x0, &(0x7f00004ee64e)}) getgroups(0x1, &(0x7f0000000080)=[0xee01]) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000040)=0x68) setgroups(0x1, &(0x7f0000000100)=[r2]) 00:24:01 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, r1, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x87}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40}, 0x14) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000001800)={0x7, &(0x7f0000000240)=""/108, &(0x7f0000001740)=[{0x6, 0xf1, 0x9, &(0x7f00000002c0)=""/241}, {0x9, 0xf9, 0x49, &(0x7f00000003c0)=""/249}, {0x685, 0x7a, 0x4, &(0x7f00000004c0)=""/122}, {0xfff, 0x9f, 0xfffffffffffffc00, &(0x7f0000000540)=""/159}, {0x3f, 0x1000, 0x4, &(0x7f0000000600)=""/4096}, {0xca, 0x3, 0x29d, &(0x7f0000001600)=""/3}, {0x9, 0xca, 0x3, &(0x7f0000001640)=""/202}]}) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r2 = getuid() setfsuid(r2) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r2}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(xeta-generic)\x00'}, 0x58) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1f}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x4010) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 00:24:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r0, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000380), &(0x7f00000000c0)=""/33}, 0x18) socket$kcm(0x29, 0x5, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0xa00, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000100)={{0x0, @broadcast, 0x4e23, 0x3, 'lblcr\x00', 0x2d, 0x2, 0x28}, {@rand_addr=0x2, 0x4e24, 0x2000, 0x88, 0x1ff, 0x1}}, 0x44) [ 230.027886] binder: 8753:8754 unknown command -519871727 [ 230.049084] binder: 8753:8754 ioctl c0306201 20007000 returned -22 00:24:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r0, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000380), &(0x7f00000000c0)=""/33}, 0x18) socket$kcm(0x29, 0x5, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0xa00, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000100)={{0x0, @broadcast, 0x4e23, 0x3, 'lblcr\x00', 0x2d, 0x2, 0x28}, {@rand_addr=0x2, 0x4e24, 0x2000, 0x88, 0x1ff, 0x1}}, 0x44) [ 230.096580] binder: BINDER_SET_CONTEXT_MGR already set 00:24:01 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, r1, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x87}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40}, 0x14) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000001800)={0x7, &(0x7f0000000240)=""/108, &(0x7f0000001740)=[{0x6, 0xf1, 0x9, &(0x7f00000002c0)=""/241}, {0x9, 0xf9, 0x49, &(0x7f00000003c0)=""/249}, {0x685, 0x7a, 0x4, &(0x7f00000004c0)=""/122}, {0xfff, 0x9f, 0xfffffffffffffc00, &(0x7f0000000540)=""/159}, {0x3f, 0x1000, 0x4, &(0x7f0000000600)=""/4096}, {0xca, 0x3, 0x29d, &(0x7f0000001600)=""/3}, {0x9, 0xca, 0x3, &(0x7f0000001640)=""/202}]}) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r2 = getuid() setfsuid(r2) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r2}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) [ 230.121081] binder: 8753:8763 ioctl 40046207 0 returned -16 [ 230.156187] binder: 8753:8776 unknown command -519871727 [ 230.163797] binder: 8753:8776 ioctl c0306201 20007000 returned -22 00:24:01 executing program 1: r0 = accept4$bt_l2cap(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0xe, 0x80000) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'veth1_to_bond\x00', {0x2, 0x4e22}}) setrlimit(0x8, &(0x7f0000000140)={0x100000000, 0xfffffffffffffffc}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000000)={'veth1\x00', {0x2, 0x4e24, @broadcast}}) mlockall(0x8000000001) 00:24:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x8003, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, @perf_bp={&(0x7f0000000480)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/rfkill\x00', 0x8900, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f00000001c0)={0xf44d, 0x6, 0xffffffff, {0x0, 0x989680}, 0x9, 0x3}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount$bpf(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000380)='bpf\x00', 0x104008, &(0x7f00000004c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030302b6597f54399a859372c8e8a244e3d30303030303030303030303030303030303030303030302c6d6f64653d30303030303030303030303034303030303030303030312c6d6f64653d30303030303030303030303030303030303030343030302c6d6f64653d30303030303030303030303031323331373234373434312c6d6f64653d30303030303030303030303030303030303030303031302c6d6f64653d30303030303030303030303030303030303030303233302c6d6f64653d30303030303030303030303030303030303030303030342c686173682c6f626a5f747970653d76626f786e657431766d6e65743076626f786e6574306d643573756d776c616e29295eff0166756e633d4250524d5f434845434b2c6f626a5f726f6c653d6e6673002c7365636c6162656c2c7375626a5f747970653d6e6673002c00"]) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00008deff8), &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) fcntl$getownex(r0, 0x10, &(0x7f0000000440)={0x0, 0x0}) perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x0, 0xfffffffffffffffd, 0x10000000000000, 0x6, 0x0, 0x88, 0x80080, 0x5, 0x3, 0x2, 0x0, 0x0, 0x4, 0x3, 0x2, 0xfffffffffffffff9, 0x1ff, 0x100000000, 0x9, 0x100000001, 0x0, 0x1000, 0x2, 0x3ff, 0x4, 0x8, 0x100000000, 0x1ff, 0x9, 0x80000000, 0x100, 0x800, 0x1, 0xfffffffffffffffe, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f00000003c0), 0x5}, 0x800, 0xe2e, 0x7fffffff, 0x6, 0x0, 0xfffffffffffff001, 0xff}, r2, 0x1, r0, 0x2) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x0, 0x10}, 0xc) getsockopt$inet6_dccp_int(r3, 0x21, 0xb, &(0x7f0000000180), &(0x7f0000000700)=0x4) socket$inet6_sctp(0xa, 0x5, 0x84) recvmmsg(0xffffffffffffffff, &(0x7f000030efc4), 0x0, 0x0, 0x0) [ 230.221469] print_req_error: I/O error, dev loop0, sector 128 00:24:01 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') r1 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x80000000, 0x121101) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x8) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f00000000c0)={0x7, 0x8001, 0x699, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'ifb0\x00'}) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000016000000020000000000000000300000000000000e00000016", 0x31, 0x1400}], 0x0, &(0x7f0000000140)) 00:24:01 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) select(0x40, &(0x7f0000000400)={0x81, 0x2, 0xe19, 0x8, 0x80000001, 0x100000000, 0x6, 0xdff}, &(0x7f0000000480)={0x1f, 0xfffffffffffffff9, 0x9, 0x7, 0x3, 0x4, 0x5, 0x5}, &(0x7f00000004c0)={0x100000000, 0xfffffffffffffffe, 0x8, 0x6, 0x8, 0x1000000000, 0x9, 0x200}, &(0x7f0000000540)={0x0, 0x7530}) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f00000001c0)) r1 = syz_open_dev$binder(&(0x7f0000000640)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x200000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400020}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x2c, r3, 0x8, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}]}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x0, &(0x7f0000000040)='+'}) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000380)={0x8, 0x0, &(0x7f0000000500)=[@release={0x40046306, 0x1}], 0x0, 0x0, &(0x7f0000000400)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x14, 0x0, &(0x7f0000000680)=[@acquire_done], 0x0, 0x0, &(0x7f00000007c0)}) r4 = getpid() getpgid(r4) 00:24:01 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, r1, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x87}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40}, 0x14) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000001800)={0x7, &(0x7f0000000240)=""/108, &(0x7f0000001740)=[{0x6, 0xf1, 0x9, &(0x7f00000002c0)=""/241}, {0x9, 0xf9, 0x49, &(0x7f00000003c0)=""/249}, {0x685, 0x7a, 0x4, &(0x7f00000004c0)=""/122}, {0xfff, 0x9f, 0xfffffffffffffc00, &(0x7f0000000540)=""/159}, {0x3f, 0x1000, 0x4, &(0x7f0000000600)=""/4096}, {0xca, 0x3, 0x29d, &(0x7f0000001600)=""/3}, {0x9, 0xca, 0x3, &(0x7f0000001640)=""/202}]}) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}]}, 0x18, 0x2) setfsuid(0x0) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}]}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:01 executing program 0: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002c80)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) gettid() ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000002cc0)={0x830a, 0x0, 0x6fff8, 0x4, 0x0, 0x6e371b8c}) bind$vsock_dgram(r1, &(0x7f00000028c0)={0x28, 0x0, 0x0, @host}, 0x10) socket(0x1b, 0x7, 0x99bb857) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000002bc0)={0x0, 'bond_slave_1\x00', 0x2}, 0x18) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000002500), &(0x7f0000002780)=0x4) shmget(0xffffffffffffffff, 0x3000, 0x78000441, &(0x7f0000ffc000/0x3000)=nil) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000140)) syz_mount_image$nfs4(&(0x7f00000002c0)='nfs4\x00', &(0x7f0000002740)='./file0\x00', 0x40, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000002ac0)="74086e750000000000000000008c00") 00:24:01 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vcs\x00', 0x20000, 0x0) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000940)) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[]) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x88402}, 0xc, &(0x7f00000004c0)={&(0x7f0000000d80)={0x14, 0x0, 0x6, 0x0, 0x70bd2c, 0x25dfdbfc, {0x2, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x20000041}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f00000001c0)) ioctl(r0, 0x360d, &(0x7f0000000600)) mount$overlay(0x404000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) syz_mount_image$ntfs(&(0x7f0000000380)='ntfs\x00', &(0x7f00000003c0)='./file0\x00', 0x1, 0x1, &(0x7f0000000400)=[{&(0x7f0000000980)="b81489272659a7ba1c7851f4d4a5cfd824f3ecc1748ad4acf37faaec88fa32625a18a91768dc0cfe30bf8b6b676a9c37c8f667090d3ec8d4b6fa3cce5833cb2d1746548cfd07af2043ca31692f17a2bce4148bf71ad20b4dfb6b7d90e4e22728606d167e4f08cf09993c8012b89ca63fc2bb22197de0d155215330", 0x7b}], 0x1001000, &(0x7f0000000440)={[], [{@hash='hash'}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@dont_hash='dont_hash'}]}) [ 230.371100] binder: 8807:8809 ioctl 40087602 200001c0 returned -22 [ 230.382921] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 230.390900] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 230.409383] F2FS-fs (loop4): Small segment_count (22 < 22 * 14) 00:24:01 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, r1, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x87}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40}, 0x14) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000001800)={0x7, &(0x7f0000000240)=""/108, &(0x7f0000001740)=[{0x6, 0xf1, 0x9, &(0x7f00000002c0)=""/241}, {0x9, 0xf9, 0x49, &(0x7f00000003c0)=""/249}, {0x685, 0x7a, 0x4, &(0x7f00000004c0)=""/122}, {0xfff, 0x9f, 0xfffffffffffffc00, &(0x7f0000000540)=""/159}, {0x3f, 0x1000, 0x4, &(0x7f0000000600)=""/4096}, {0xca, 0x3, 0x29d, &(0x7f0000001600)=""/3}, {0x9, 0xca, 0x3, &(0x7f0000001640)=""/202}]}) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}]}, 0x18, 0x2) setfsuid(0x0) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}]}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) [ 230.415545] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock [ 230.469469] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 230.475259] binder: 8807:8827 ioctl 40087602 200001c0 returned -22 [ 230.494302] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 230.511438] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 230.531730] F2FS-fs (loop4): Small segment_count (22 < 22 * 14) [ 230.538051] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock [ 230.543485] binder: BINDER_SET_CONTEXT_MGR already set 00:24:02 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, r1, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x87}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40}, 0x14) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000001800)={0x7, &(0x7f0000000240)=""/108, &(0x7f0000001740)=[{0x6, 0xf1, 0x9, &(0x7f00000002c0)=""/241}, {0x9, 0xf9, 0x49, &(0x7f00000003c0)=""/249}, {0x685, 0x7a, 0x4, &(0x7f00000004c0)=""/122}, {0xfff, 0x9f, 0xfffffffffffffc00, &(0x7f0000000540)=""/159}, {0x3f, 0x1000, 0x4, &(0x7f0000000600)=""/4096}, {0xca, 0x3, 0x29d, &(0x7f0000001600)=""/3}, {0x9, 0xca, 0x3, &(0x7f0000001640)=""/202}]}) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}]}, 0x18, 0x2) setfsuid(0x0) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}]}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) [ 230.574710] binder: 8807:8809 ioctl 40046207 0 returned -16 [ 230.574731] binder_alloc: 8807: binder_alloc_buf, no vma [ 230.605168] binder: 8807:8841 BC_ACQUIRE_DONE u0000000000000000 no match [ 230.624247] binder: 8807:8840 Release 1 refcount change on invalid ref 1 ret -22 [ 230.649765] binder: 8807:8836 transaction failed 29189/-3, size 24-8 line 2973 00:24:02 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, r1, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x87}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40}, 0x14) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000001800)={0x7, &(0x7f0000000240)=""/108, &(0x7f0000001740)=[{0x6, 0xf1, 0x9, &(0x7f00000002c0)=""/241}, {0x9, 0xf9, 0x49, &(0x7f00000003c0)=""/249}, {0x685, 0x7a, 0x4, &(0x7f00000004c0)=""/122}, {0xfff, 0x9f, 0xfffffffffffffc00, &(0x7f0000000540)=""/159}, {0x3f, 0x1000, 0x4, &(0x7f0000000600)=""/4096}, {0xca, 0x3, 0x29d, &(0x7f0000001600)=""/3}, {0x9, 0xca, 0x3, &(0x7f0000001640)=""/202}]}) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) r2 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r2}, 0x18, 0x2) setfsuid(r2) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r2}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:02 executing program 0: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) write(0xffffffffffffffff, &(0x7f0000000400), 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x10000200003) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e23, 0x5, @empty, 0x3}}}, &(0x7f0000000300)=0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000340)={r2, 0x5d77479e}, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept4(r0, 0x0, &(0x7f0000da8ffc), 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x9]}}}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)) [ 230.680222] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 230.687582] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 230.699571] binder: release 8807:8827 transaction 3 out, still active 00:24:02 executing program 3: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000980)={0x8, "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", 0x1000}, 0x1006) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000a40)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000140)={0x2, "1b53"}, 0x3) sendfile(r0, r0, &(0x7f00000000c0), 0x8080fffffffe) [ 230.733122] F2FS-fs (loop4): Small segment_count (22 < 22 * 14) [ 230.734573] binder: send failed reply for transaction 3, target dead [ 230.751014] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 230.766016] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock [ 230.783285] overlayfs: filesystem on './file0' not supported as upperdir [ 230.794660] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 230.811291] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 230.820226] F2FS-fs (loop4): Small segment_count (22 < 22 * 14) [ 230.826335] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 00:24:02 executing program 1: rt_sigprocmask(0x0, &(0x7f0000039ff8)={0xfffffffffffffffa}, 0x0, 0x8) r0 = gettid() timer_create(0x8000000009, &(0x7f00000001c0)={0x0, 0x3e, 0x4, @tid=r0}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, &(0x7f0000040000)) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) read(r1, &(0x7f0000000240)=""/128, 0xffffffffffffff49) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000400)='IPVS\x00', 0x0) write$P9_ROPEN(r2, &(0x7f0000000080)={0x18, 0x71, 0x2, {{0x0, 0x1, 0x7}, 0xfffffffffffffff8}}, 0x18) ioctl$SCSI_IOCTL_SYNC(r2, 0x4) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x2) timer_delete(0x0) 00:24:02 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vcs\x00', 0x20000, 0x0) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000940)) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[]) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x88402}, 0xc, &(0x7f00000004c0)={&(0x7f0000000d80)={0x14, 0x0, 0x6, 0x0, 0x70bd2c, 0x25dfdbfc, {0x2, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x20000041}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f00000001c0)) ioctl(r0, 0x360d, &(0x7f0000000600)) mount$overlay(0x404000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) syz_mount_image$ntfs(&(0x7f0000000380)='ntfs\x00', &(0x7f00000003c0)='./file0\x00', 0x1, 0x1, &(0x7f0000000400)=[{&(0x7f0000000980)="b81489272659a7ba1c7851f4d4a5cfd824f3ecc1748ad4acf37faaec88fa32625a18a91768dc0cfe30bf8b6b676a9c37c8f667090d3ec8d4b6fa3cce5833cb2d1746548cfd07af2043ca31692f17a2bce4148bf71ad20b4dfb6b7d90e4e22728606d167e4f08cf09993c8012b89ca63fc2bb22197de0d155215330", 0x7b}], 0x1001000, &(0x7f0000000440)={[], [{@hash='hash'}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@dont_hash='dont_hash'}]}) 00:24:02 executing program 4: getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000200)=ANY=[], &(0x7f00000001c0)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x60c00, 0x0) fcntl$addseals(r0, 0x409, 0xe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r1, 0x18) r2 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000000100)={@empty, @local, 0x0}, &(0x7f0000000140)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000180)={@mcast2, 0x80, r3}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) dup3(r1, r2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000380), &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480)=ANY=[], &(0x7f0000000440)) 00:24:02 executing program 1: prctl$setmm(0x23, 0x7, &(0x7f0000470000/0x1000)=nil) prctl$setmm(0x23, 0x6, &(0x7f00001b5000/0x1000)=nil) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$clear(0x7, r0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 00:24:02 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, r1, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x87}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40}, 0x14) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000001800)={0x7, &(0x7f0000000240)=""/108, &(0x7f0000001740)=[{0x6, 0xf1, 0x9, &(0x7f00000002c0)=""/241}, {0x9, 0xf9, 0x49, &(0x7f00000003c0)=""/249}, {0x685, 0x7a, 0x4, &(0x7f00000004c0)=""/122}, {0xfff, 0x9f, 0xfffffffffffffc00, &(0x7f0000000540)=""/159}, {0x3f, 0x1000, 0x4, &(0x7f0000000600)=""/4096}, {0xca, 0x3, 0x29d, &(0x7f0000001600)=""/3}, {0x9, 0xca, 0x3, &(0x7f0000001640)=""/202}]}) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) r2 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r2}, 0x18, 0x2) setfsuid(r2) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r2}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) [ 231.161083] FAT-fs (loop3): invalid media value (0x00) [ 231.166582] FAT-fs (loop3): Can't find a valid FAT filesystem [ 231.179844] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 00:24:02 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400001, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000080)={'bridge_slave_0\x00', @broadcast}) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$ext4(&(0x7f0000000400)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="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", 0x101, 0x400}], 0x0, &(0x7f0000000140)) readlinkat(r1, &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000440)=""/4096, 0x1000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0xf1}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=r2, &(0x7f0000000200)=0x4) [ 231.246791] FAT-fs (loop3): invalid media value (0x00) [ 231.258166] FAT-fs (loop3): Can't find a valid FAT filesystem 00:24:02 executing program 0: sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x40) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000001080)=@ipx, &(0x7f0000001100)=0x80, 0x80800) getsockopt$inet_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000480)=""/254, &(0x7f00000003c0)=0xfe) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f00000004c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = gettid() r4 = getuid() getgroups(0x4, &(0x7f00000008c0)=[0x0, 0xee00, 0xee00, 0xee01]) getuid() getgid() gettid() stat(&(0x7f0000000940)='./bus\x00', &(0x7f0000000980)) stat(&(0x7f0000000a00)='./bus/file0\x00', &(0x7f0000000a40)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000d80)=0x0) stat(&(0x7f0000000dc0)='./bus\x00', &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getpid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000f00)={0x0, 0x0}, &(0x7f0000001900)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000f80)={0x0, 0x0, 0x0}, &(0x7f0000000fc0)=0xc) r12 = gettid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001140)={{{@in6=@remote, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000001000)=0xe8) r14 = getgid() r15 = getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000001240)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001040)=0xe8) r17 = getegid() ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000001340)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001380)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000001480)=0xe8) lstat(&(0x7f00000014c0)='./bus\x00', &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001580)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000015c0)={0x0, 0x0}, &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./bus\x00', &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f0000001840)=[{&(0x7f00000005c0)=@file={0x1, './bus\x00'}, 0x6e, &(0x7f0000000680)=[{&(0x7f00000007c0)="c77001d926800f82f1e739f22d9782de89f620bbf1b9ee91a934d35f11eb89604ff7f9bb7e096e24ae9f5dee095c3e1f6ab9ad3b2a744b18c72641e3138e34b1e35387da2ca0300851d97768ca624bc7a02897ed7f431f8a90de3bc7d139e48ad142b20c73836dd05c766e6adb535c3b5a4dca2c5e363f4c8be4c07ee75a892943ffe289021c86c57faf32ba2ea1e0da538b9a4a1e9d526356d9d9748d85f3edbce4f4243d4c65e0666b6a6be1b0e48d460fd5a1e9a747737a7de77ea13763d5dc16983d0ee47f2c215ad3936cf19a0476447894247e28982fb269616e9ea13c4fe59521908fcb", 0xe7}], 0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="20000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r2, @ANYBLOB="4951bbbfe695d03c5fd86e6aadd45ac7e440e23d84245793ac87b4704cfcb455"], 0x40, 0x4000800}, {&(0x7f0000000b40)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000d40)=[{&(0x7f0000000cc0)="447c0e775615a8cfeb088ff67346265ec3b8333335541d270232e580315c3c216b5ac89ac4051ca0fe1e1bbb0969d87a68549afb67eb3ee379be0f9246d85f4d8b913103950e31b65a6d9a3b37ec2042c631336b2323e1c7d30e9f35a115d6c37e4ca467315ef74a4d221f6ba7e61c73074b22626a8f4a8e0dd3cd768832", 0x7e}], 0x1, &(0x7f0000001700)=[@cred={0x20, 0x1, 0x2, r6, r7, r8}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @cred={0x20, 0x1, 0x2, r12, r13, r14}, @cred={0x20, 0x1, 0x2, r15, r16, r17}, @cred={0x20, 0x1, 0x2, r18, r19, r20}, @cred={0x20, 0x1, 0x2, r21, r22, r23}], 0xc0, 0x4004}], 0x2, 0x8004) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) fstat(r0, &(0x7f0000000240)) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r2, 0x8008ae9d, &(0x7f00000002c0)=""/229) r24 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) sendfile(r2, r24, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) 00:24:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x4b0203, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000080)=0x401, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000280)={0x77, 0x0, [0x4b564d03, 0x1, 0x277]}) 00:24:02 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, r1, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x87}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40}, 0x14) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000001800)={0x7, &(0x7f0000000240)=""/108, &(0x7f0000001740)=[{0x6, 0xf1, 0x9, &(0x7f00000002c0)=""/241}, {0x9, 0xf9, 0x49, &(0x7f00000003c0)=""/249}, {0x685, 0x7a, 0x4, &(0x7f00000004c0)=""/122}, {0xfff, 0x9f, 0xfffffffffffffc00, &(0x7f0000000540)=""/159}, {0x3f, 0x1000, 0x4, &(0x7f0000000600)=""/4096}, {0xca, 0x3, 0x29d, &(0x7f0000001600)=""/3}, {0x9, 0xca, 0x3, &(0x7f0000001640)=""/202}]}) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) r2 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r2}, 0x18, 0x2) setfsuid(r2) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r2}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:02 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000180), 0x0) getpgid(0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="290000000600000000000000000000000400000000000000030000000000000000000000000000000069127fbcdab56d0f1f4cb25800000000000021b0c9e06ea050325f77726e71bff4c99eef500ade32c424020f322903f5bad93a0c2f1e19cc826b23ce090bcf125dccadf0ffe7f2e16407a9b161"], 0x76) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x82) r4 = dup3(r1, 0xffffffffffffff9c, 0x0) write$P9_RLERRORu(r4, &(0x7f0000000280)={0x15, 0x7, 0x2, {{0x8, 'cgroup2\x00'}, 0x10001}}, 0x15) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) r6 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r6, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r6, 0xffffffffffffff7f) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r7, &(0x7f0000e33fe0), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r7, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) clone(0x0, &(0x7f0000000400), &(0x7f0000000180), &(0x7f0000000000), &(0x7f0000000280)) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000400)={0x80000001, 0xbff, &(0x7f00000002c0)="788c8b66795b827b516a0bee0c5772c4f845d4558183", &(0x7f0000000340)="7cf3a6e8a4d3cf5f0a", 0x16, 0x9}) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81806) ioctl$sock_SIOCSIFBR(r5, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000380)='irlan0\x00', 0x7}) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000240)={0x0, 0x5}) sendfile(r3, r3, &(0x7f0000000200), 0x2000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$rds(r4, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 231.424391] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 00:24:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) close(r0) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r3, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r4, &(0x7f0000001900)="746808066164656400", 0x9) [ 231.505187] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:24:02 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, r1, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x87}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40}, 0x14) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000001800)={0x7, &(0x7f0000000240)=""/108, &(0x7f0000001740)=[{0x6, 0xf1, 0x9, &(0x7f00000002c0)=""/241}, {0x9, 0xf9, 0x49, &(0x7f00000003c0)=""/249}, {0x685, 0x7a, 0x4, &(0x7f00000004c0)=""/122}, {0xfff, 0x9f, 0xfffffffffffffc00, &(0x7f0000000540)=""/159}, {0x3f, 0x1000, 0x4, &(0x7f0000000600)=""/4096}, {0xca, 0x3, 0x29d, &(0x7f0000001600)=""/3}, {0x9, 0xca, 0x3, &(0x7f0000001640)=""/202}]}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r2 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r2}, 0x18, 0x2) setfsuid(r2) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r2}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:03 executing program 4: getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000200)=ANY=[], &(0x7f00000001c0)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x60c00, 0x0) fcntl$addseals(r0, 0x409, 0xe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r1, 0x18) r2 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000000100)={@empty, @local, 0x0}, &(0x7f0000000140)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000180)={@mcast2, 0x80, r3}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) dup3(r1, r2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000380), &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000480)=ANY=[], &(0x7f0000000440)) [ 231.662130] EXT4-fs (loop1): couldn't mount as ext2 due to feature incompatibilities 00:24:03 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, r1, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x87}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40}, 0x14) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000001800)={0x7, &(0x7f0000000240)=""/108, &(0x7f0000001740)=[{0x6, 0xf1, 0x9, &(0x7f00000002c0)=""/241}, {0x9, 0xf9, 0x49, &(0x7f00000003c0)=""/249}, {0x685, 0x7a, 0x4, &(0x7f00000004c0)=""/122}, {0xfff, 0x9f, 0xfffffffffffffc00, &(0x7f0000000540)=""/159}, {0x3f, 0x1000, 0x4, &(0x7f0000000600)=""/4096}, {0xca, 0x3, 0x29d, &(0x7f0000001600)=""/3}, {0x9, 0xca, 0x3, &(0x7f0000001640)=""/202}]}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r2 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r2}, 0x18, 0x2) setfsuid(r2) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r2}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:03 executing program 1: ioctl(0xffffffffffffffff, 0x3, &(0x7f0000000180)="0300000000000000c13db14548a670343d2e2e22b6143ea564a43eaa09398b608f1a22064a65da99e870b056e76c21904b040294fddb8ae9fbbb1eaa3003f4aec4283e3dc6059e31e6944094b17a756241f0db06fafd7efae8be943fa44f26513d61c49da934165b999eb399dc7ee8db6b73a6eb80216b1f1387e00480b119070770") r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000002000)=[{&(0x7f0000b4efab)="5500000018007fafb7a41cb22da280000206000000a843096c37236939000900210003004b00ca8a9848a3090000006b7b31afdc1338d54400009b84136ef75afb83de4411006827c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f0000004000)}, 0x0) [ 231.830521] device nr0 entered promiscuous mode 00:24:03 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x18, &(0x7f0000000080), 0x301) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x2, 0x0) write$P9_RREADDIR(r1, &(0x7f00000000c0)={0x49, 0x29, 0x1, {0x3ff, [{{0x2, 0x4, 0x6}, 0xffffffff, 0x6, 0x7, './file0'}, {{0x0, 0x2, 0x1}, 0xcd, 0x78, 0x7, './file0'}]}}, 0x49) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) 00:24:03 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, r1, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x87}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40}, 0x14) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000001800)={0x7, &(0x7f0000000240)=""/108, &(0x7f0000001740)=[{0x6, 0xf1, 0x9, &(0x7f00000002c0)=""/241}, {0x9, 0xf9, 0x49, &(0x7f00000003c0)=""/249}, {0x685, 0x7a, 0x4, &(0x7f00000004c0)=""/122}, {0xfff, 0x9f, 0xfffffffffffffc00, &(0x7f0000000540)=""/159}, {0x3f, 0x1000, 0x4, &(0x7f0000000600)=""/4096}, {0xca, 0x3, 0x29d, &(0x7f0000001600)=""/3}, {0x9, 0xca, 0x3, &(0x7f0000001640)=""/202}]}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r2 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r2}, 0x18, 0x2) setfsuid(r2) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r2}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:03 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r0, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x4e21, @broadcast}}, 0x81, 0x400, 0x7f, "5100dec824bb4d03b4f87df99e029fd590d5783e3f96a68243989c1dde84378be0c99e0ed9f80c4f0f17a6d0f2d583ee48c91b2ea8cab9f83ed593b6a3312f6517fddfc2f02393ee2f93899468af2aa3"}, 0xd8) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3f, 0x60000) ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000001c0)={0x3, 0x4, [{0x7, 0x0, 0x1ff}, {0xfffffffffffffff7, 0x0, 0x50}, {0xc30, 0x0, 0x10001}]}) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000200)) 00:24:03 executing program 0: sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x40) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000001080)=@ipx, &(0x7f0000001100)=0x80, 0x80800) getsockopt$inet_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000480)=""/254, &(0x7f00000003c0)=0xfe) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f00000004c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = gettid() r4 = getuid() getgroups(0x4, &(0x7f00000008c0)=[0x0, 0xee00, 0xee00, 0xee01]) getuid() getgid() gettid() stat(&(0x7f0000000940)='./bus\x00', &(0x7f0000000980)) stat(&(0x7f0000000a00)='./bus/file0\x00', &(0x7f0000000a40)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000d80)=0x0) stat(&(0x7f0000000dc0)='./bus\x00', &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getpid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000f00)={0x0, 0x0}, &(0x7f0000001900)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000f80)={0x0, 0x0, 0x0}, &(0x7f0000000fc0)=0xc) r12 = gettid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001140)={{{@in6=@remote, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000001000)=0xe8) r14 = getgid() r15 = getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000001240)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001040)=0xe8) r17 = getegid() ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000001340)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001380)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000001480)=0xe8) lstat(&(0x7f00000014c0)='./bus\x00', &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001580)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000015c0)={0x0, 0x0}, &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./bus\x00', &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f0000001840)=[{&(0x7f00000005c0)=@file={0x1, './bus\x00'}, 0x6e, &(0x7f0000000680)=[{&(0x7f00000007c0)="c77001d926800f82f1e739f22d9782de89f620bbf1b9ee91a934d35f11eb89604ff7f9bb7e096e24ae9f5dee095c3e1f6ab9ad3b2a744b18c72641e3138e34b1e35387da2ca0300851d97768ca624bc7a02897ed7f431f8a90de3bc7d139e48ad142b20c73836dd05c766e6adb535c3b5a4dca2c5e363f4c8be4c07ee75a892943ffe289021c86c57faf32ba2ea1e0da538b9a4a1e9d526356d9d9748d85f3edbce4f4243d4c65e0666b6a6be1b0e48d460fd5a1e9a747737a7de77ea13763d5dc16983d0ee47f2c215ad3936cf19a0476447894247e28982fb269616e9ea13c4fe59521908fcb", 0xe7}], 0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="20000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r2, @ANYBLOB="4951bbbfe695d03c5fd86e6aadd45ac7e440e23d84245793ac87b4704cfcb455"], 0x40, 0x4000800}, {&(0x7f0000000b40)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000d40)=[{&(0x7f0000000cc0)="447c0e775615a8cfeb088ff67346265ec3b8333335541d270232e580315c3c216b5ac89ac4051ca0fe1e1bbb0969d87a68549afb67eb3ee379be0f9246d85f4d8b913103950e31b65a6d9a3b37ec2042c631336b2323e1c7d30e9f35a115d6c37e4ca467315ef74a4d221f6ba7e61c73074b22626a8f4a8e0dd3cd768832", 0x7e}], 0x1, &(0x7f0000001700)=[@cred={0x20, 0x1, 0x2, r6, r7, r8}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @cred={0x20, 0x1, 0x2, r12, r13, r14}, @cred={0x20, 0x1, 0x2, r15, r16, r17}, @cred={0x20, 0x1, 0x2, r18, r19, r20}, @cred={0x20, 0x1, 0x2, r21, r22, r23}], 0xc0, 0x4004}], 0x2, 0x8004) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) fstat(r0, &(0x7f0000000240)) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r2, 0x8008ae9d, &(0x7f00000002c0)=""/229) r24 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) sendfile(r2, r24, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) 00:24:03 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, r1) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x200040) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="736563757269747900000000000000000000000000000000776ed187a5dce81c3e9c000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) 00:24:03 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, r1, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x87}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3e}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40}, 0x14) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r2 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r2}, 0x18, 0x2) setfsuid(r2) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r2}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000180), 0x0) getpgid(0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="290000000600000000000000000000000400000000000000030000000000000000000000000000000069127fbcdab56d0f1f4cb25800000000000021b0c9e06ea050325f77726e71bff4c99eef500ade32c424020f322903f5bad93a0c2f1e19cc826b23ce090bcf125dccadf0ffe7f2e16407a9b161"], 0x76) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x82) r4 = dup3(r1, 0xffffffffffffff9c, 0x0) write$P9_RLERRORu(r4, &(0x7f0000000280)={0x15, 0x7, 0x2, {{0x8, 'cgroup2\x00'}, 0x10001}}, 0x15) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) r6 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r6, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r6, 0xffffffffffffff7f) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r7, &(0x7f0000e33fe0), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r7, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) clone(0x0, &(0x7f0000000400), &(0x7f0000000180), &(0x7f0000000000), &(0x7f0000000280)) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000400)={0x80000001, 0xbff, &(0x7f00000002c0)="788c8b66795b827b516a0bee0c5772c4f845d4558183", &(0x7f0000000340)="7cf3a6e8a4d3cf5f0a", 0x16, 0x9}) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81806) ioctl$sock_SIOCSIFBR(r5, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000380)='irlan0\x00', 0x7}) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000240)={0x0, 0x5}) sendfile(r3, r3, &(0x7f0000000200), 0x2000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$rds(r4, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:24:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) close(r0) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r3, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r4, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80, 0x0) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e20, 0x4, @local, 0xe4c}, 0x1c) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) socket$kcm(0x11, 0x2, 0x300) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) r2 = semget$private(0x0, 0x0, 0x80) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f00000001c0)=""/126) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000300)={&(0x7f0000077000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) 00:24:04 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, r1) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x200040) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="736563757269747900000000000000000000000000000000776ed187a5dce81c3e9c000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) 00:24:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000180), 0x0) getpgid(0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="290000000600000000000000000000000400000000000000030000000000000000000000000000000069127fbcdab56d0f1f4cb25800000000000021b0c9e06ea050325f77726e71bff4c99eef500ade32c424020f322903f5bad93a0c2f1e19cc826b23ce090bcf125dccadf0ffe7f2e16407a9b161"], 0x76) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x82) r4 = dup3(r1, 0xffffffffffffff9c, 0x0) write$P9_RLERRORu(r4, &(0x7f0000000280)={0x15, 0x7, 0x2, {{0x8, 'cgroup2\x00'}, 0x10001}}, 0x15) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) r6 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r6, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r6, 0xffffffffffffff7f) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r7, &(0x7f0000e33fe0), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r7, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) clone(0x0, &(0x7f0000000400), &(0x7f0000000180), &(0x7f0000000000), &(0x7f0000000280)) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000400)={0x80000001, 0xbff, &(0x7f00000002c0)="788c8b66795b827b516a0bee0c5772c4f845d4558183", &(0x7f0000000340)="7cf3a6e8a4d3cf5f0a", 0x16, 0x9}) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81806) ioctl$sock_SIOCSIFBR(r5, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000380)='irlan0\x00', 0x7}) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000240)={0x0, 0x5}) sendfile(r3, r3, &(0x7f0000000200), 0x2000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$rds(r4, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:24:04 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:04 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000700)={0x90, 0x75, 0x1, {0xfffffffffffffe9a, "c30735e695ca2f283b5198347e63c182cb61a105dc8eb3225db13831f318f6fbeb515fc9fa965db9d918dab6da113dfe9108939287a8ec769723b3d198f8723fad9c6d351bc0c8c1af7a71711977763d7a6977d44135ad2f287413ebc399cf2105f04eb4b85159d3d087c6f60a50408429853b589a863c4b341ea8ca495f785354b6c88ed6"}}, 0x90) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000001c0)='/dev/usbmon#\x00') r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000380)={0x3f, 0x75, 0x1, {0x34, "89d305ba705a8adbf615418d4f2eaafcd8173f951a14c788ec288826d622ba8b3416340eab47776828765529a1d52485e1a7f140"}}, 0x3f) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) openat$dsp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dsp\x00', 0x40000, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, &(0x7f0000000540)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000440)=0x100000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, &(0x7f0000000040), 0x10000000000443) writev(r3, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) sendmsg$xdp(r3, &(0x7f0000000300)={&(0x7f0000000140), 0x10, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) 00:24:04 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) [ 232.710320] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:24:04 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, r1) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x200040) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="736563757269747900000000000000000000000000000000776ed187a5dce81c3e9c000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) 00:24:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80, 0x0) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e20, 0x4, @local, 0xe4c}, 0x1c) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) socket$kcm(0x11, 0x2, 0x300) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) r2 = semget$private(0x0, 0x0, 0x80) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f00000001c0)=""/126) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000300)={&(0x7f0000077000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) 00:24:04 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:04 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, r1) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x200040) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="736563757269747900000000000000000000000000000000776ed187a5dce81c3e9c000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) 00:24:04 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) close(r0) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r3, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r4, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80, 0x0) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e20, 0x4, @local, 0xe4c}, 0x1c) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) socket$kcm(0x11, 0x2, 0x300) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) r2 = semget$private(0x0, 0x0, 0x80) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f00000001c0)=""/126) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000300)={&(0x7f0000077000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) 00:24:04 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:04 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, r1) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x200040) 00:24:04 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaac6000800450000300000000000019078ac1414bbac1414001208907800000000450000000000000000000000ac7014aaac141400422b80c5189190a628f7197e91ec"], &(0x7f0000000100)) 00:24:05 executing program 5: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000480)={0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000005c0)) getpgid(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000300)=0x81, 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r3, 0x800000000008982, &(0x7f0000000080)) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="290000000600000000000000000000000400000000000000030000000000000000000000000000000069127fbcdab56d0f1f4cb25800000000000021b0c9e06ea050325f77726e71bff4c99eef500ade32c424020f322903f5bad93a"], 0x5c) mount(&(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x82) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000d80)=ANY=[@ANYBLOB="efc5e47cbc7ae7ff513ab13b36608028b6e0d45b983798d902ee11effcb461b7ad236976a726f83ce6d57efe55a50ef991b3c3ddb0e9929a7cea50bd7d49ed8d14365d38305ed445f6110946af1dfec5b184f5d5f1eb0d286d4bf73391d8ecef4408cbe2b2a088097c20a8cb0e4c340524e94c0772ecb3445ff4a6088087dc5774c29ed431704fa92ce61b76595ce61060ab3abf57262054fcee7a6cca3d42afd269f1f82659025194d3277aa8ec5389178a50db2a06ef37f7125b98ff4a82e68b3e0be1cce52893e98f9801a20444c6ce5b22000000000000000000000000000000", @ANYRESHEX=r2, @ANYRES16=r6], &(0x7f0000000100)=0x3) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) r7 = memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x0) syz_open_dev$usbmon(&(0x7f0000000840)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xbd, &(0x7f00000014c0)}, &(0x7f0000000100)=0x10) io_submit(r8, 0x1, &(0x7f00000000c0)=[&(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x80000000000, r5, &(0x7f0000001000), 0x0, 0x5, 0x0, 0x0, r7}]) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) sendmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000004c0)=@nl=@kern={0x10, 0x0, 0x0, 0x80000}, 0xa63bd3268fd06628, &(0x7f00000007c0), 0xffffffffffffeb5, &(0x7f0000000e00)=ANY=[], 0x0, 0x840}, 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) memfd_create(&(0x7f0000000640)="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", 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x0, 0x0) sendfile(r6, r7, &(0x7f0000000380), 0x2000005) 00:24:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fremovexattr(r0, &(0x7f0000000000)=@random={'btrfs.', '/dev/kvm\x00'}) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x200300, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x9, 0x8000) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f00000000c0)=0x7) 00:24:05 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, r1) 00:24:05 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80, 0x0) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e20, 0x4, @local, 0xe4c}, 0x1c) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) socket$kcm(0x11, 0x2, 0x300) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) r2 = semget$private(0x0, 0x0, 0x80) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f00000001c0)=""/126) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000300)={&(0x7f0000077000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) 00:24:05 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r0 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r0}, 0x18, 0x2) setfsuid(r0) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r0}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(0xffffffffffffffff, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 00:24:05 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(0x0, r1) [ 233.887351] device nr0 entered promiscuous mode 00:24:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) close(r0) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r3, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r4, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:05 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e21, 0xffffffffffffff9b, @loopback, 0x5}, 0x1c) syz_emit_ethernet(0x193, &(0x7f0000000040)={@local, @dev={[], 0xa}, [{[], {0x8100, 0xbb4, 0x9, 0x2}}], {@mpls_uc={0x8847, {[{0x1, 0x80000001, 0x2, 0x100000000}, {0x0, 0x4, 0x4}, {0xff, 0x1, 0x200000000000000, 0x9}, {0x2, 0x8, 0x3e24, 0x10c0000000000000}, {0x3, 0x7fffffff, 0x2}, {0x86, 0x400, 0x4, 0xfffffffffffffffc}, {0x9, 0x5, 0x3, 0x6}], @ipv4={{0x37, 0x4, 0x1, 0x2, 0x165, 0x66, 0x7, 0xf9, 0x2, 0x0, @remote, @remote, {[@lsrr={0x83, 0x1f, 0x5, [@broadcast, @rand_addr=0x20, @remote, @multicast1, @dev={0xac, 0x14, 0x14, 0xa}, @broadcast, @multicast1]}, @ra={0x94, 0x6, 0x7}, @ssrr={0x89, 0x1f, 0x800, [@multicast2, @empty, @local, @multicast2, @loopback, @rand_addr=0x5, @rand_addr=0x800]}, @rr={0x7, 0x1b, 0xb6e, [@rand_addr, @local, @remote, @dev={0xac, 0x14, 0x14, 0xc}, @local, @broadcast]}, @timestamp={0x44, 0x3c, 0x888000000, 0x3, 0x2, [{[@empty], 0x7}, {[], 0xdd}, {[], 0x3f}, {[@multicast2], 0x1f}, {[@broadcast], 0x101}, {[@multicast1], 0x6}, {[], 0x7}, {[@dev={0xac, 0x14, 0x14, 0x16}], 0xc24}, {[], 0x7}]}, @lsrr={0x83, 0x7, 0x3f, [@local]}, @end, @cipso={0x86, 0x25, 0x0, [{0x1, 0x7, "3a83ea774e"}, {0x6, 0xb, "2cf553c088d747d01d"}, {0x2, 0xd, "07686457dfae847cf039eb"}]}]}}, @dccp={{0x4e22, 0x4e23, 0x4, 0x1, 0x7, 0x0, 0x0, 0x8, 0x9, "2d149a", 0x69, "b63bb0"}, "58c0f293af81dc9feacfa2c7b28e5853d1723af0e8c291dc33d6b8aff972fce41d5a6022df3f38a8e129ce95a143a1e1e2092f880282a52e88420d3f18baffcae047a927fe16d859825c0a83399ff6f5bd830b8bb96d522b450706375471f0cd03cb16cd6540a9e63001677c0a1923495b0fe7e0abe9c98d45"}}}}}}, &(0x7f0000000200)={0x1, 0x2, [0xdd6, 0x129, 0x370, 0x2e3]}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @ipv4={[], [], @local}, 0x2}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f0000000280)=ANY=[@ANYBLOB="ffffffffffff7f000000000000004500001c00000000001190788100000079a1954d302f8a3d59e964af4eace37f0000064e244e2000089078"], 0x0) 00:24:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80, 0x0) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e20, 0x4, @local, 0xe4c}, 0x1c) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) socket$kcm(0x11, 0x2, 0x300) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) r2 = semget$private(0x0, 0x0, 0x80) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f00000001c0)=""/126) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000300)={&(0x7f0000077000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) 00:24:05 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r0 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r0}, 0x18, 0x2) setfsuid(r0) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r0}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(0xffffffffffffffff, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 00:24:05 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(0x0, r1) 00:24:05 executing program 5: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000480)={0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000005c0)) getpgid(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000300)=0x81, 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r3, 0x800000000008982, &(0x7f0000000080)) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="290000000600000000000000000000000400000000000000030000000000000000000000000000000069127fbcdab56d0f1f4cb25800000000000021b0c9e06ea050325f77726e71bff4c99eef500ade32c424020f322903f5bad93a"], 0x5c) mount(&(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x82) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000d80)=ANY=[@ANYBLOB="efc5e47cbc7ae7ff513ab13b36608028b6e0d45b983798d902ee11effcb461b7ad236976a726f83ce6d57efe55a50ef991b3c3ddb0e9929a7cea50bd7d49ed8d14365d38305ed445f6110946af1dfec5b184f5d5f1eb0d286d4bf73391d8ecef4408cbe2b2a088097c20a8cb0e4c340524e94c0772ecb3445ff4a6088087dc5774c29ed431704fa92ce61b76595ce61060ab3abf57262054fcee7a6cca3d42afd269f1f82659025194d3277aa8ec5389178a50db2a06ef37f7125b98ff4a82e68b3e0be1cce52893e98f9801a20444c6ce5b22000000000000000000000000000000", @ANYRESHEX=r2, @ANYRES16=r6], &(0x7f0000000100)=0x3) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) r7 = memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x0) syz_open_dev$usbmon(&(0x7f0000000840)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xbd, &(0x7f00000014c0)}, &(0x7f0000000100)=0x10) io_submit(r8, 0x1, &(0x7f00000000c0)=[&(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x80000000000, r5, &(0x7f0000001000), 0x0, 0x5, 0x0, 0x0, r7}]) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) sendmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000004c0)=@nl=@kern={0x10, 0x0, 0x0, 0x80000}, 0xa63bd3268fd06628, &(0x7f00000007c0), 0xffffffffffffeb5, &(0x7f0000000e00)=ANY=[], 0x0, 0x840}, 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) memfd_create(&(0x7f0000000640)="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", 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x0, 0x0) sendfile(r6, r7, &(0x7f0000000380), 0x2000005) 00:24:06 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r0 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r0}, 0x18, 0x2) setfsuid(r0) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r0}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(0xffffffffffffffff, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 00:24:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000180), 0x1) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000003c0)={0x0, 0x2a, "2d9aa3e6dafb2349460163d5930c5e11871ae88b726ff96403293527d0e593581c026aa86a9ccf1672f4"}, &(0x7f0000000400)=0x32) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000440)=@assoc_id=r1, &(0x7f0000000480)=0x4) finit_module(r0, &(0x7f00000027c0)='/dev/loop#\x00', 0x0) ftruncate(r0, 0x0) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x80, 0x80100) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x1d}, 0x2}}, [0xffff, 0x8001, 0x3, 0x2, 0x100000001, 0x1c0000000, 0x1ff, 0x2, 0x8001, 0x7, 0x3, 0xdfb, 0x1, 0x80c]}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000140)={0x7, 0x2, 0x4, 0x5, r3}, &(0x7f0000000380)=0x10) 00:24:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80, 0x0) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e20, 0x4, @local, 0xe4c}, 0x1c) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) socket$kcm(0x11, 0x2, 0x300) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) r2 = semget$private(0x0, 0x0, 0x80) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f00000001c0)=""/126) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:06 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(0x0, r1) 00:24:06 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) [ 234.755188] device nr0 entered promiscuous mode 00:24:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000180), 0x1) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000003c0)={0x0, 0x2a, "2d9aa3e6dafb2349460163d5930c5e11871ae88b726ff96403293527d0e593581c026aa86a9ccf1672f4"}, &(0x7f0000000400)=0x32) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000440)=@assoc_id=r1, &(0x7f0000000480)=0x4) finit_module(r0, &(0x7f00000027c0)='/dev/loop#\x00', 0x0) ftruncate(r0, 0x0) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x80, 0x80100) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x1d}, 0x2}}, [0xffff, 0x8001, 0x3, 0x2, 0x100000001, 0x1c0000000, 0x1ff, 0x2, 0x8001, 0x7, 0x3, 0xdfb, 0x1, 0x80c]}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000140)={0x7, 0x2, 0x4, 0x5, r3}, &(0x7f0000000380)=0x10) 00:24:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:06 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)) setreuid(r1, 0x0) setreuid(0x0, r1) 00:24:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80, 0x0) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e20, 0x4, @local, 0xe4c}, 0x1c) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) socket$kcm(0x11, 0x2, 0x300) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) r2 = semget$private(0x0, 0x0, 0x80) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f00000001c0)=""/126) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:06 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:06 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000001c0)={0x7, 0x1}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x2, 0x4000) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x9, 0x880) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1}, 0x14) socket(0x17, 0x800, 0xfffffffffffffffb) sendmmsg$inet_sctp(r0, &(0x7f0000871fc8), 0x4924924924925d0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast2, @in6=@local, 0x4e21, 0x7, 0x4e23, 0x1, 0xa, 0x6e291028cec479b8, 0x80, 0x3b, r1, r3}, {0x3, 0x1, 0x1, 0x1, 0x9, 0x5, 0x8a, 0xfff}, {0xffff, 0x3, 0x0, 0x2}, 0xfffffffffffffffd, 0x6e6bb9, 0x2, 0x1}, {{@in6=@ipv4={[], [], @rand_addr=0x20}, 0x4d6, 0xff}, 0x0, @in6=@dev={0xfe, 0x80, [], 0xa}, 0x3500, 0x3, 0x0, 0xff00000000000000, 0x4, 0x1, 0x40}}, 0xe8) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r4, 0x40045730, &(0x7f0000000440)=0x4) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0bc5351, &(0x7f0000000380)={0xffffffffa8fae906, 0x1, 'client0\x00', 0xffffffff80000000, "4944633a24ba5276", "03eb7fe911793439b2d014f187c78ba901e84439a14e02e146883a83c141d0ea", 0xf7e}) fsetxattr$security_capability(r2, &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v1={0x1000000, [{0x0, 0x2}]}, 0xc, 0x0) 00:24:06 executing program 5: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000480)={0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000005c0)) getpgid(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000300)=0x81, 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r3, 0x800000000008982, &(0x7f0000000080)) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="290000000600000000000000000000000400000000000000030000000000000000000000000000000069127fbcdab56d0f1f4cb25800000000000021b0c9e06ea050325f77726e71bff4c99eef500ade32c424020f322903f5bad93a"], 0x5c) mount(&(0x7f0000000b00)=ANY=[@ANYBLOB="cb2b4d8d30ea9b5255175d43fca389e342de5ec740fe96132329bdfbaa11c5521288697c83a9f28c7ee9d8df70f2c6849d443d5bc274a1f1576385a885b764dc4babfdf01646fa85765072f75f3267f1ced252e7419523d2075fb98f5696f4bf38817b25525ef2a46b39c1d223d17b505512d51a0a1e53f8e26cded92ba381b83d2692b7fa7ffd3f81026e3e999bc357521a8e9799fe114e204db050bf9a50c94d3d01f8a436ccaf26a8bd4cd371f401cff939fa559e71ce024fc3c4540465cd73fd534855cb35571f6c01fbcad172ee88d3a2c1108134b2e349048cb3fd136752e22ad37130a3014904c8afeb025f1a5b426943fc0d38cea7e868b819004d05a190fcb27e1b682765f16ba1733cc86ddf9b7cbfc1cea713a9279937652b78963ed3d352daa19eb5b567f8156ef8661d30269dacb35b9eb5efb6ed7a40f42386c06e90c13ede70e584d826126e0acc8d9d6c446b45fa4912d4c3f59995b4cd7c7313a0c375fc672a4905617dbefd2030c5593984e80b4932fdd35a0864cad3db9d9b14c550c89efbff479d3d0b77cbfab7c263b06b28e41bcf9beb1232ca4a6e129cd719b48d5b28c6ae0db6028873d9ef9a2d85679395f05b4fa857f333aca961427cba61ef75b215861b2bb8ce0545af9ccaca0c2d87524f6b23c17997f988e42f22fa55ae0e57099661d3f982869fc3b6b96f4c88b901a2da76a358b8d68b1c31880e8e177700c6f32a8dab9eb2b917516734badbf94fe95b76f375f1dee7b85c1d95a7896742b513d057ab4e714b80"], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x82) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000d80)=ANY=[@ANYBLOB="efc5e47cbc7ae7ff513ab13b36608028b6e0d45b983798d902ee11effcb461b7ad236976a726f83ce6d57efe55a50ef991b3c3ddb0e9929a7cea50bd7d49ed8d14365d38305ed445f6110946af1dfec5b184f5d5f1eb0d286d4bf73391d8ecef4408cbe2b2a088097c20a8cb0e4c340524e94c0772ecb3445ff4a6088087dc5774c29ed431704fa92ce61b76595ce61060ab3abf57262054fcee7a6cca3d42afd269f1f82659025194d3277aa8ec5389178a50db2a06ef37f7125b98ff4a82e68b3e0be1cce52893e98f9801a20444c6ce5b22000000000000000000000000000000", @ANYRESHEX=r2, @ANYRES16=r6], &(0x7f0000000100)=0x3) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) r7 = memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x0) syz_open_dev$usbmon(&(0x7f0000000840)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xbd, &(0x7f00000014c0)}, &(0x7f0000000100)=0x10) io_submit(r8, 0x1, &(0x7f00000000c0)=[&(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x80000000000, r5, &(0x7f0000001000), 0x0, 0x5, 0x0, 0x0, r7}]) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) sendmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000004c0)=@nl=@kern={0x10, 0x0, 0x0, 0x80000}, 0xa63bd3268fd06628, &(0x7f00000007c0), 0xffffffffffffeb5, &(0x7f0000000e00)=ANY=[], 0x0, 0x840}, 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) memfd_create(&(0x7f0000000640)="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", 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x0, 0x0) sendfile(r6, r7, &(0x7f0000000380), 0x2000005) 00:24:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80, 0x0) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e20, 0x4, @local, 0xe4c}, 0x1c) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) socket$kcm(0x11, 0x2, 0x300) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) r2 = semget$private(0x0, 0x0, 0x80) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f00000001c0)=""/126) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:07 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:07 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)) setreuid(r1, 0x0) setreuid(0x0, r1) 00:24:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80, 0x0) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e20, 0x4, @local, 0xe4c}, 0x1c) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) socket$kcm(0x11, 0x2, 0x300) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) r2 = semget$private(0x0, 0x0, 0x80) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f00000001c0)=""/126) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) [ 235.729245] device nr0 entered promiscuous mode 00:24:07 executing program 2: mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:07 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)) setreuid(r1, 0x0) setreuid(0x0, r1) 00:24:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) close(r0) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) recvmsg$kcm(r3, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r4, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:07 executing program 2: mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80, 0x0) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e20, 0x4, @local, 0xe4c}, 0x1c) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) socket$kcm(0x11, 0x2, 0x300) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) semget$private(0x0, 0x0, 0x80) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:07 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, r1) 00:24:07 executing program 5: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000480)={0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000005c0)) getpgid(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000300)=0x81, 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r3, 0x800000000008982, &(0x7f0000000080)) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="290000000600000000000000000000000400000000000000030000000000000000000000000000000069127fbcdab56d0f1f4cb25800000000000021b0c9e06ea050325f77726e71bff4c99eef500ade32c424020f322903f5bad93a"], 0x5c) mount(&(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x82) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000d80)=ANY=[@ANYBLOB="efc5e47cbc7ae7ff513ab13b36608028b6e0d45b983798d902ee11effcb461b7ad236976a726f83ce6d57efe55a50ef991b3c3ddb0e9929a7cea50bd7d49ed8d14365d38305ed445f6110946af1dfec5b184f5d5f1eb0d286d4bf73391d8ecef4408cbe2b2a088097c20a8cb0e4c340524e94c0772ecb3445ff4a6088087dc5774c29ed431704fa92ce61b76595ce61060ab3abf57262054fcee7a6cca3d42afd269f1f82659025194d3277aa8ec5389178a50db2a06ef37f7125b98ff4a82e68b3e0be1cce52893e98f9801a20444c6ce5b22000000000000000000000000000000", @ANYRESHEX=r2, @ANYRES16=r6], &(0x7f0000000100)=0x3) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) r7 = memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x0) syz_open_dev$usbmon(&(0x7f0000000840)='/dev/usbmon#\x00', 0x0, 0x400880) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xbd, &(0x7f00000014c0)}, &(0x7f0000000100)=0x10) io_submit(r8, 0x1, &(0x7f00000000c0)=[&(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x80000000000, r5, &(0x7f0000001000), 0x0, 0x5, 0x0, 0x0, r7}]) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) sendmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000004c0)=@nl=@kern={0x10, 0x0, 0x0, 0x80000}, 0xa63bd3268fd06628, &(0x7f00000007c0), 0xffffffffffffeb5, &(0x7f0000000e00)=ANY=[], 0x0, 0x840}, 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) memfd_create(&(0x7f0000000640)="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", 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x0, 0x0) sendfile(r6, r7, &(0x7f0000000380), 0x2000005) 00:24:07 executing program 0: r0 = socket(0x10, 0x802, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0xbae0cddd330c0f40, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x0, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000200)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000100)=0xfffffffffffff573, r2, 0x0, 0x0, 0x1}}, 0x20) preadv(r1, &(0x7f0000000380)=[{&(0x7f0000000240)=""/104, 0x68}, {&(0x7f00000002c0)=""/192, 0xc0}], 0x2, 0x0) write$P9_RVERSION(r1, &(0x7f00000003c0)={0x15, 0x65, 0xffff, 0x80000000, 0x8, '9P2000.u'}, 0x15) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000440)={0x1f, 0x2f, &(0x7f0000000400)="d8bb562625fbe041165675df633eb1ea0f1ccfe14b84210092d7216725af8bdd1032516cbc956706a87373a39d5d2b"}) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=@deltaction={0x2c, 0x31, 0x301, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x18, 0x1, [{0x14, 0x1, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}]}]}, 0x2c}}, 0x0) 00:24:07 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, r1) 00:24:07 executing program 2: mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) [ 236.211351] netlink: 16 bytes leftover after parsing attributes in process `syz-executor0'. 00:24:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80, 0x0) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e20, 0x4, @local, 0xe4c}, 0x1c) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) socket$kcm(0x11, 0x2, 0x300) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:07 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, r1) 00:24:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:07 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) [ 236.657010] device nr0 entered promiscuous mode 00:24:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) close(r0) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r3, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80, 0x0) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e20, 0x4, @local, 0xe4c}, 0x1c) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) socket$kcm(0x11, 0x2, 0x300) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:08 executing program 1: socket(0x11, 0x80003, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setreuid(0x0, 0x0) setreuid(0x0, 0x0) 00:24:08 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:08 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000001680)={0x0, 0x100, 0x1, 0x5ab, 0x4, 0x1, 0x8, 0x8, {0x0, @in6={{0xa, 0x4e24, 0x1, @mcast2, 0xfc}}, 0x0, 0x3f, 0x6, 0x95c, 0x2e5}}, &(0x7f00000002c0)=0xb0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000001740)={0x0, 0x7, 0x1, 0x9, 0x7fff, 0x60b, 0xc51, 0x26, {0x0, @in6={{0xa, 0x4e22, 0x8000, @empty, 0x8000}}, 0x7, 0x9, 0x7ff, 0x3, 0x5}}, &(0x7f0000001800)=0xb0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000002a40)={0x0, 0xffffffff}, &(0x7f0000002a80)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000003280)={0x0, @in={{0x2, 0x4e21, @local}}}, &(0x7f0000003340)=0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000003380)={0x0, 0x8}, &(0x7f00000033c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000003400)={0x0, 0xa9, 0xfc, 0x1a85}, &(0x7f0000003440)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000003480)={0x0, 0x8}, &(0x7f00000034c0)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000003500)={0x0, 0xff, 0x0, 0x8, 0xffff, 0x4}, &(0x7f0000003540)=0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000003800)=ANY=[@ANYBLOB="17000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000003840)=0x5) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000003880)={0x0, @in={{0x2, 0x4e20}}, 0x3e000, 0x8, 0x4, 0x6, 0x1ff}, &(0x7f0000003940)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000003980)={0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000039c0)=0x2c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x2, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x3f, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}, 0x800}}}, 0xa0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000800)=ANY=[], &(0x7f00000002c0)) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300), 0x4) syz_open_dev$vcsa(&(0x7f0000000480)='/dev/vcsa#\x00', 0x6, 0x3fc) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000680)={0x0, 0x9}, &(0x7f00000006c0)=0x8) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) renameat(r3, &(0x7f0000000140)='./file0\x00', r2, &(0x7f0000000240)='./file1\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000540)}, 0x10) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='nfs\x00', 0x0, &(0x7f0000000000)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x400000, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x2, @mcast2, 0x1}, {0xa, 0x4e23, 0x7, @local, 0x2}, r1, 0x4de8a597}}, 0x48) 00:24:08 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4400, 0x0) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x90, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, 0x23, 0x0, 0x2, 0x18, 0x14, "b6e08f9644c2e3c11671b48bd59b753f22072bf690a05f1eec16422c63c4f1f24207e548f667de5a587396c9b98af9c5399e0c5d07cc3f5c4521f31f99c8791c", "a42d15063b4ae15a784054f41d1ba0f03b4c60970de9e6860c0a59e1dfe2ac76525e4533324280e8d4f171b6971467bc05fcd21b514c2d4e9e13d7cddf3ec919", "d60c1798d96fabf3e0c5dc768bb0cbad3aeabb6dce83c9cd6958340336ee914f", [0x3ff, 0x68]}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_cache\x00') preadv(r2, &(0x7f0000000100), 0x2a2, 0x0) 00:24:08 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:08 executing program 1: socket(0x11, 0x80003, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setreuid(0x0, 0x0) setreuid(0x0, 0x0) 00:24:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) close(r0) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) recvmsg$kcm(r3, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r4, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80, 0x0) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e20, 0x4, @local, 0xe4c}, 0x1c) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) socket$kcm(0x11, 0x2, 0x300) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:08 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:08 executing program 1: socket(0x11, 0x80003, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setreuid(0x0, 0x0) setreuid(0x0, 0x0) 00:24:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) close(r0) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r3, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:09 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000002c0)=ANY=[]) setxattr$trusted_overlay_origin(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', 0xfffffffffffffffd, 0xfffffffffffffebd, 0x2) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x10000) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000240)={0x0, 0xf8}) 00:24:09 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80, 0x0) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e20, 0x4, @local, 0xe4c}, 0x1c) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) socket$kcm(0x11, 0x2, 0x300) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:09 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setreuid(r0, 0x0) setreuid(0x0, r0) 00:24:09 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setreuid(r0, 0x0) setreuid(0x0, r0) [ 237.911255] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 00:24:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80, 0x0) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e20, 0x4, @local, 0xe4c}, 0x1c) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) socket$kcm(0x11, 0x2, 0x300) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:09 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) [ 237.982409] overlayfs: filesystem on './file0' not supported as upperdir 00:24:09 executing program 0: syz_open_dev$admmidi(&(0x7f0000000d40)='/dev/admmidi#\x00', 0xdffffffffffffffd, 0x10402) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000e80)}], 0x1200000, &(0x7f0000000940)) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[]) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000008c0)=@abs={0x1}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)}], 0x1}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:24:09 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setreuid(r0, 0x0) setreuid(0x0, r0) 00:24:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x3, 0x76, 0x6, 0x3615, 0x0, 0xff, 0x400, 0x4, 0x2, 0x4, 0x2, 0x40, 0x3, 0x4, 0x1, 0x100000000, 0x26, 0x6, 0x800, 0x77, 0x9e5e, 0x8, 0x800, 0x1ff, 0x7, 0x1b8, 0xff, 0xfffffffffffffff9, 0x3f, 0x10001, 0x1f, 0x8, 0x120000000000000, 0x401, 0x8, 0x400, 0x0, 0x401, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x8140, 0xd5, 0x29, 0x7, 0x7, 0x1, 0x4}, r2, 0x0, 0xffffffffffffffff, 0x1) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1, &(0x7f0000000000), 0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000012000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000012000/0x18000)=nil, &(0x7f00000002c0)=[@text32={0x20, &(0x7f00000004c0)="f0f7158f00000066ba4200ed0f23ea2e660f38812fb9800000c00f3235000800000f300f20d835200000000f22d864f3f20f070fc79ffeffffff66ba210066b8004866efda7600", 0x47}], 0x1, 0x0, &(0x7f0000000000), 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000540)=""/4096) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:24:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80, 0x0) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e20, 0x4, @local, 0xe4c}, 0x1c) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) socket$kcm(0x11, 0x2, 0x300) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) [ 238.222457] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 238.297031] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 00:24:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) close(r0) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r3, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:10 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80, 0x0) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e20, 0x4, @local, 0xe4c}, 0x1c) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) socket$kcm(0x11, 0x2, 0x300) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:10 executing program 1: r0 = socket(0x0, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, r1) 00:24:10 executing program 5: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x800000000044031, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000140)={@multicast2, @loopback, @loopback}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x2d, &(0x7f0000000000)={@loopback, @local, @broadcast}, 0xc) 00:24:10 executing program 0: r0 = creat(&(0x7f0000000200)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=@known='security.evm\x00', &(0x7f0000000180)='\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000000c0)) r2 = inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x4000044) inotify_rm_watch(r0, r2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000340)={'vcan0\x00', r1}) clock_adjtime(0x0, &(0x7f0000000380)={0x7, 0xf2, 0x2, 0x8, 0x0, 0x5, 0x7, 0x8, 0x1, 0x8, 0x0, 0x0, 0x2, 0x4, 0x7ff, 0x5a, 0x10000, 0x1, 0x8001, 0xfffffffffffff801, 0x10001, 0xfffffffffffffffd, 0xfffffffffffffffe, 0x4f20, 0xffffffff, 0x264}) creat(&(0x7f0000000040)='./file0\x00', 0x0) 00:24:10 executing program 5: getuid() ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000100)) r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x203) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) dup2(r1, r0) 00:24:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80, 0x0) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e20, 0x4, @local, 0xe4c}, 0x1c) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000200), 0xc, &(0x7f0000000500)={&(0x7f0000000600)=ANY=[]}}, 0x40800) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000640)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) socket(0x4, 0x80000, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000300)={0x0, @local, @local}, &(0x7f00000003c0)=0xffffff44) write(0xffffffffffffffff, &(0x7f0000fa8000)='\'', 0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f00009b2000/0x18000)=nil, &(0x7f0000001580)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400090000006766c7442404020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000001500), 0x57c) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffff9c, 0x84, 0x21, &(0x7f0000000000)=0x2, 0x4) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000780)={0x0, 0x0, 0x101, 0x4, 0xc7, 0x3}, &(0x7f00000007c0)=0x14) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000040)={0x8}, 0x4) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000800)={0x0, 0x9, 0x7, [0x0, 0x0, 0x100, 0x4, 0x7, 0x28000000, 0xca]}, 0x16) 00:24:10 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:10 executing program 1: r0 = socket(0x0, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, r1) 00:24:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f00000001c0)="86c55f9a50302ffaf9a37d78ac385010b965adcf28e138afed200aefee2f56a24757f3344574824cf5629a1e77351b8cf4c8bc487f9a44b347382c7ffccfde16951f5f2616445ff4f9eb261ef6be3a739b9f16c946831747db4c9f066d677ce3b66c7a0b1073019a458eae83124bb547ab8f1d25cd29b073750c6a3b94a9a51c4b82a661fc10449447f6543aa64a2621694be1f47933839b0ad8e6b8b592569196b547f288fb043f", 0xa8, 0xfffffffffffffffc) r2 = add_key(&(0x7f0000000400)='cifs.idmap\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="4538e0a4dd9e41030279df416fbc41650a596e780bd9929f1d55f5baebfd93fa13e9a675a79a6a8fcce8c32394b6b63b3ef799f279cb12339d1df28b8bd920a2a04f05eebd1174fa2878746165aae8b9744bc551", 0x54, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r1, &(0x7f0000000140)=[{&(0x7f0000000280)="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", 0xff}, {&(0x7f0000000380)="d87601820161a1b307eb24c724e0e787ef6512ddf2909147efa377f42b83f7c7ed645af1e552f9196277b7d44da7f3efe94397b76e53cb61ea2f5e21fda1105985c468fe", 0x44}], 0x2, r2) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}]}, 0x0) 00:24:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) close(r0) r3 = socket$kcm(0x2, 0x3, 0x2) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r3, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r4, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80, 0x0) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e20, 0x4, @local, 0xe4c}, 0x1c) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:10 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f00000001c0)="86c55f9a50302ffaf9a37d78ac385010b965adcf28e138afed200aefee2f56a24757f3344574824cf5629a1e77351b8cf4c8bc487f9a44b347382c7ffccfde16951f5f2616445ff4f9eb261ef6be3a739b9f16c946831747db4c9f066d677ce3b66c7a0b1073019a458eae83124bb547ab8f1d25cd29b073750c6a3b94a9a51c4b82a661fc10449447f6543aa64a2621694be1f47933839b0ad8e6b8b592569196b547f288fb043f", 0xa8, 0xfffffffffffffffc) r2 = add_key(&(0x7f0000000400)='cifs.idmap\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="4538e0a4dd9e41030279df416fbc41650a596e780bd9929f1d55f5baebfd93fa13e9a675a79a6a8fcce8c32394b6b63b3ef799f279cb12339d1df28b8bd920a2a04f05eebd1174fa2878746165aae8b9744bc551", 0x54, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r1, &(0x7f0000000140)=[{&(0x7f0000000280)="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", 0xff}, {&(0x7f0000000380)="d87601820161a1b307eb24c724e0e787ef6512ddf2909147efa377f42b83f7c7ed645af1e552f9196277b7d44da7f3efe94397b76e53cb61ea2f5e21fda1105985c468fe", 0x44}], 0x2, r2) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}]}, 0x0) 00:24:10 executing program 1: r0 = socket(0x0, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, r1) 00:24:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000200), 0xc, &(0x7f0000000500)={&(0x7f0000000600)=ANY=[]}}, 0x40800) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000640)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) socket(0x4, 0x80000, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000300)={0x0, @local, @local}, &(0x7f00000003c0)=0xffffff44) write(0xffffffffffffffff, &(0x7f0000fa8000)='\'', 0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f00009b2000/0x18000)=nil, &(0x7f0000001580)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400090000006766c7442404020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000001500), 0x57c) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffff9c, 0x84, 0x21, &(0x7f0000000000)=0x2, 0x4) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000780)={0x0, 0x0, 0x101, 0x4, 0xc7, 0x3}, &(0x7f00000007c0)=0x14) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000040)={0x8}, 0x4) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000800)={0x0, 0x9, 0x7, [0x0, 0x0, 0x100, 0x4, 0x7, 0x28000000, 0xca]}, 0x16) 00:24:11 executing program 5: r0 = memfd_create(&(0x7f0000000140)='#em1#+\x00', 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e23, 0x1, @remote, 0x9}}, 0x0, 0x1, 0x400, 0x2, 0x1}, &(0x7f0000000280)=0x98) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000002c0)=r1, 0x4) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x9}, &(0x7f0000000080)=0x8) r3 = semget(0x3, 0x2, 0x200) semctl$SETVAL(r3, 0x0, 0x10, &(0x7f00000000c0)=0x7f) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000004c0)=ANY=[@ANYRES32=r2, @ANYBLOB="3c000000767bc2534acc2d637a3600007fe9092e557087ce025460e899d6fc3704f2aa8f077dfbb7b93dab5ea04015a8e39acffd39ba9a71363b2cae866e02f3591adee29aaab097"], &(0x7f0000000180)=0x44) openat$urandom(0xffffffffffffff9c, &(0x7f0000000480)='/dev/urandom\x00', 0x222042, 0x0) fcntl$getown(r0, 0x9) fremovexattr(r0, &(0x7f0000000000)=@known='trusted.overlay.impure\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000300)={r2, @in={{0x2, 0x4e20}}, [0x1, 0x100000001, 0x7, 0x1ff, 0x4, 0xdaf, 0x10000, 0x7, 0x300000, 0x401, 0x7, 0x1, 0x5, 0x2, 0x8]}, &(0x7f0000000400)=0x100) setsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f0000000440)=0x7, 0x4) getpeername$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, &(0x7f0000000540)=0x10) 00:24:11 executing program 1: r0 = socket(0x11, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, r1) 00:24:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80, 0x0) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e20, 0x4, @local, 0xe4c}, 0x1c) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:11 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:11 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x800) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f000000dfd0)={0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000680)}) r2 = dup(r1) socket$inet_udp(0x2, 0x2, 0x0) getsockname$unix(r2, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000), 0x1, 0xfffffdfd, &(0x7f0000000540)='K'}) 00:24:11 executing program 1: r0 = socket(0x11, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, r1) [ 239.835035] binder: 9523:9525 ioctl c0306201 200005c0 returned -11 00:24:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) close(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:11 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x10200, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x58, r1, 0x420, 0x70bd26, 0x25dfdbff, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x200}, @NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r3}]}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x4}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x40004) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x1011fa, 0x0) ioctl$TCSETSW(r4, 0xc08c5102, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffffffffffffe}) 00:24:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80, 0x0) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e20, 0x4, @local, 0xe4c}, 0x1c) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:11 executing program 1: r0 = socket(0x11, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, r1) 00:24:11 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{0x8000000000000000, 0x1f, 0x9}, "73797a2fed00000000000000002c150000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500", 0x80000000008}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)=0x0) r2 = syz_open_dev$sndpcmp(&(0x7f00000005c0)='/dev/snd/pcmC#D#p\x00', 0xc2, 0x20c00) perf_event_open(&(0x7f0000000500)={0x6, 0x70, 0x5, 0x0, 0x8, 0x3, 0x0, 0x5, 0x6, 0x5, 0x8edb, 0x4, 0x81, 0x9, 0xc6, 0x8, 0x560, 0x238, 0x1, 0x9, 0x1, 0x7fffffff, 0x100, 0x2, 0x1000, 0x5, 0x8, 0x24, 0xffff, 0x49a, 0x6, 0x0, 0x9, 0x1, 0x24a, 0x8, 0x80000000, 0x7, 0x0, 0x9, 0x4, @perf_bp={&(0x7f00000004c0)}, 0x12000, 0x0, 0x97, 0x7, 0x200, 0x6, 0x4000000000}, r1, 0x3, r2, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) r3 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x40ec07, 0x0) r4 = dup3(r0, r3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x4, 0x6ae, 0xd9}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000280)={r6, 0x1, 0x10}, &(0x7f00000002c0)=0xc) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getgid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)) chown(&(0x7f0000000380)='./file0\x00', r7, r8) ioctl$sock_SIOCGIFCONF(r4, 0x8910, &(0x7f0000000080)=@req={0x28, &(0x7f0000000040)={'eql\x00', @ifru_flags=0x4600}}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r5, 0x800c6613, &(0x7f00000000c0)={0x0, @aes256, 0x1, "41857614d9387cf7"}) 00:24:11 executing program 1: socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setreuid(r0, 0x0) setreuid(0x0, r0) 00:24:11 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) [ 240.440674] input: syz/í as /devices/virtual/input/input7 [ 240.477382] input: syz/í as /devices/virtual/input/input8 00:24:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) close(r0) r3 = socket$kcm(0x2, 0x3, 0x2) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r3, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r4, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80, 0x0) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e20, 0x4, @local, 0xe4c}, 0x1c) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) getsockopt$sock_int(r0, 0x1, 0xc, &(0x7f0000000280), &(0x7f0000000300)=0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x100) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x11a, 0xffff, 0x6, 0x5, 0x8, 0x5, 0x6244cc88, {0x0, @in={{0x2, 0x4e21, @remote}}, 0x869, 0x35fd, 0x0, 0x6, 0x7fff}}, &(0x7f00000001c0)=0xb0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000200)={r2, 0x2}, &(0x7f0000000240)=0x8) r3 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r3, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000002400)=""/16, 0x10}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x4, &(0x7f0000004780)=""/245, 0xf5}}, {{&(0x7f0000006a00)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000006b40)}}], 0x2, 0x0, &(0x7f0000008000)={0x0, 0x989680}) 00:24:12 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r3, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r4, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:12 executing program 1: socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setreuid(r0, 0x0) setreuid(0x0, r0) 00:24:12 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:12 executing program 1: socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setreuid(r0, 0x0) setreuid(0x0, r0) 00:24:12 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000001840)={0x0, 0x3, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:12 executing program 4: mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:12 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, r1) 00:24:12 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:12 executing program 5: r0 = socket$inet6(0xa, 0x80803, 0x87) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x2b}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x90}}, 0xe8) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000000)=0x13, 0x4) connect$inet6(r0, &(0x7f00000000c0), 0x1c) 00:24:12 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x2, 0x2b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000080], 0x0, &(0x7f0000000040), &(0x7f0000000080)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x11, 0x0, 0x0, 'tunl0\x00', 'gre0\x00', 'eql\x00', 'gre0\x00', @remote, [], @dev, [], 0xa0, 0xd0, 0x100, [@cpu={'cpu\x00', 0x8, {{0x0, 0x4}}}]}, [@common=@AUDIT={'AUDIT\x00', 0x8}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}, {{{0x9, 0x0, 0x0, 'ip6_vti0\x00', 'ifb0\x00', 'erspan0\x00', 'ipddp0\x00', @dev, [], @empty, [], 0x70, 0xa8, 0xf8}, [@common=@mark={'mark\x00', 0x10}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x330) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x400000, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{0x4, 0xac}, {0x1, 0x1}]}) 00:24:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) close(r0) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r3, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r4, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:13 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, r1) 00:24:13 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x0, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:13 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x9, 0x440) ioctl$TIOCGPTPEER(r1, 0x5441, 0x4) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) bind$alg(r2, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha256\x00'}, 0x58) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000080)={'team_slave_1\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1a}}}) 00:24:13 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = memfd_create(&(0x7f0000000140)="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", 0x0) write$eventfd(r2, &(0x7f0000000100)=0xa, 0x2) sendfile(r2, r2, &(0x7f0000000480), 0xffff) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r2, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000040)) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f00000002c0)={@dev, @rand_addr, 0x0}, &(0x7f0000000300)=0xc) sendmsg$nl_route_sched(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000004}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@getqdisc={0x28, 0x26, 0x400, 0x70bd2a, 0x25dfdbff, {0x0, r3, {0x3}, {0x0, 0x4}, {0x0, 0xf}}, [{0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40) 00:24:13 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, r1) 00:24:13 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x0, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:13 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$sock_buf(r1, 0x1, 0x1c, &(0x7f0000000300)=""/80, &(0x7f0000000380)=0x50) r2 = getpid() fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x3, 0x1, 0x6, 0x7, r2}) 00:24:13 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, r1) 00:24:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) [ 242.052279] device nr0 entered promiscuous mode 00:24:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:14 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x0, 0xa4, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x0, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f00000001c0)={0x4, 0x1, 0x3, 0x400}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x80000, 0x0) ioctl$TIOCMGET(r3, 0x5415, &(0x7f0000000080)) mq_timedreceive(r3, &(0x7f00000000c0)=""/132, 0x84, 0x1654, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x740}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$apparmor_exec(r1, &(0x7f0000000200)={'stack ', '/dev/kvm\x00'}, 0xf) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 00:24:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:14 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, r1) 00:24:14 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-net\x00', 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x6000) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002980)=0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000fa4000)={0x3, r1}) r2 = open(&(0x7f0000002c80)='./file1\x00', 0x80000, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000002840)={0x0, 0x1}, &(0x7f0000002880)) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000002c40)={r3, 0xffff, 0x20}, 0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000140)={0x2, 'veth1\x00', 0x4}, 0x18) r6 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, &(0x7f0000002800)) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f00000029c0)={0x0, 0x9, 0x8, 'queue1\x00', 0x1}) pwritev(r6, &(0x7f0000000340), 0x0, 0x81806) r7 = gettid() process_vm_readv(r7, &(0x7f0000000280)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000000180)=""/139, 0x8b}, {&(0x7f0000000240)=""/51, 0x33}], 0x3, &(0x7f00000026c0), 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000002a80)='xfs\x00', &(0x7f0000002ac0)='./file0\x00', 0x4, 0x1, &(0x7f0000003d00)=[{&(0x7f0000002cc0)="91ecfed61df21f4d9436e4c3de3b663957d796125212470d8b6765673c3824cec9f14b944a2ce855457c0574d985f88bba6638bc0bcf9a027983a7f8675d0baa14029bf1597d94e7fea7bf43a9bfcaca77bd611e6262243b36f10fa76e80979678f7036a2617314aeedcf55951f268d14aebc5f1377308e13657fd1c4b628451195c2d518d5990746a4ab631d4799d8f1dd5a10154ccd1a2d83c08d615e773371c3776075508455a5a485b3f4103c59cf83623dc178545d2656203b4", 0xbc, 0xe71}], 0x0, &(0x7f0000003f40)=ANY=[]) prlimit64(r7, 0xf, &(0x7f0000002940)={0x3, 0xffffffffffffffff}, &(0x7f0000002900)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f00000028c0)={0x10}) ioctl$EVIOCGLED(r6, 0x80404519, &(0x7f0000003180)=""/225) ioctl$EVIOCGKEYCODE_V2(r6, 0x80284504, &(0x7f0000003f00)=""/22) perf_event_open(&(0x7f0000000180)={0x2, 0x4203da1ea02bc3e3, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = socket(0x10, 0x802, 0x0) write(r8, &(0x7f0000000200)="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", 0xfc) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000002c0)={0x62, @local, 0x4e23, 0x2, 'fo\x00', 0x1, 0x6, 0x4b}, 0x2c) ioctl$SNDRV_TIMER_IOCTL_GINFO(r6, 0xc0f85403, &(0x7f0000002d80)={{0xfffffffffffffffd, 0x0, 0x4, 0x3, 0x8}, 0x4, 0x1, 'id1\x00', 'timer0\x00', 0x0, 0x1, 0x81, 0x3, 0x100}) sendfile(r4, r5, &(0x7f0000002c00), 0x2) ioctl$LOOP_CLR_FD(r6, 0x4c01) gettid() [ 242.811335] IPVS: sync thread started: state = BACKUP, mcast_ifn = veth1, syncid = 4, id = 0 00:24:14 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, r1) 00:24:14 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) [ 242.860908] netlink: 180 bytes leftover after parsing attributes in process `syz-executor0'. 00:24:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x0, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) [ 242.934394] netlink: 180 bytes leftover after parsing attributes in process `syz-executor0'. [ 242.970601] device nr0 entered promiscuous mode 00:24:14 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:14 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) setreuid(r1, 0x0) setreuid(0x0, r1) 00:24:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:15 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x451, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000480)='/dev/vcsa#\x00', 0xbb, 0x10400) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000280)={0x3e76, {{0x2, 0x4e24}}, {{0x2, 0x4e20}}}, 0x108) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) connect$unix(r2, &(0x7f0000001580)=@file={0x0, './file0\x00'}, 0x6e) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000100)={0x6, 0x5d, 0x5, 0x9, 0x9}) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) recvmmsg(r2, &(0x7f00000000c0)=[{{&(0x7f00000003c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/91, 0x5b}], 0x1, &(0x7f0000000540)=""/4096, 0x1000, 0x7fff}}], 0x1, 0x102, &(0x7f0000001540)={r6, r7+30000000}) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000200)) ioctl$void(0xffffffffffffffff, 0xc0045878) socket$netlink(0x10, 0x3, 0x1000000000000000) sysfs$3(0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400090000006766c7442402020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) 00:24:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x0, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:15 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) get_robust_list(r1, &(0x7f0000000240)=&(0x7f0000000200)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)}}, &(0x7f0000000280)=0x18) setsockopt$inet6_buf(r0, 0x29, 0x35, &(0x7f0000000180), 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f0000000180), 0x0, 0xfffffffffffffffb) syz_extract_tcp_res$synack(&(0x7f0000000340), 0x1, 0x0) sched_getattr(0x0, &(0x7f0000000180), 0x30, 0x0) 00:24:15 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) setreuid(r1, 0x0) setreuid(0x0, r1) 00:24:15 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x0, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:15 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:15 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) setreuid(r1, 0x0) setreuid(0x0, r1) 00:24:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:15 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(0x0, 0x0) setreuid(0x0, r1) [ 243.950144] device nr0 entered promiscuous mode [ 244.093001] device nr0 entered promiscuous mode 00:24:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:16 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:16 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(0x0, 0x0) setreuid(0x0, r1) 00:24:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:16 executing program 5: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)=0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x2, 0x7, 0x2, 0x1, 0x0, 0xff, 0x8, 0x8, 0x9, 0xfffffffffffffffd, 0x4, 0x0, 0x6, 0x99, 0x3, 0xffff, 0xfffffffffffffffa, 0x7, 0x80, 0xfffffffffffffffb, 0x9, 0x4, 0x5dcc, 0x1ff, 0x0, 0x278, 0x7ff, 0x8, 0x100, 0x907, 0x1, 0xd839, 0x1, 0xd3ca, 0x1, 0xfff, 0x0, 0x3ff, 0x1, @perf_bp={&(0x7f0000000280), 0x4}, 0x20, 0xffff, 0x9, 0x0, 0x68, 0x4, 0x7fff}, r1, 0x6, 0xffffffffffffff9c, 0x1) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r3 = memfd_create(&(0x7f0000002b00)='self,\x00', 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000002780)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) read$FUSE(r3, &(0x7f00000008c0), 0x1000) prlimit64(0x0, 0xf, &(0x7f0000002940)={0x3}, &(0x7f0000002900)) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000029c0), &(0x7f0000002a00)=0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x7, 0x20, 0x0, 0xd, 0x6, 0xc, "3768637824dd942e472466b90e99909457694c26903d5c846da7b37866dc9dd205fd6fc2572433ee66879880c9d79ab10ed1c008a231e8e847567936153b9357", "d651e0ee096aceca3e802805999f4bf8bf4ebc5c3a3a529b3f2063af1b6647b49768e4dea098b3dc94cb9b649c06297a2bd22c311122ec2a620e0b9460688adc", "d7a9873c19b67920ecbf35a21ce309490ebf99a78c04641b1c7890ce7687f527", [0x100, 0x9c]}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000028c0)={0x10}) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f00000002c0)={0x62, @local, 0x4e23, 0x2, 'fo\x00', 0x1, 0x6, 0x4b}, 0x2c) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000027c0)={{0x3}, 0x7, 0x1, 'id1\x00', 'timer1\x00', 0x0, 0x1, 0x81, 0x0, 0x101}) r4 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r4, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) r5 = getpid() tkill(r5, 0x1000000000015) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0xc1105517, &(0x7f0000001000)) 00:24:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:16 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:16 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:16 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(0x0, 0x0) setreuid(0x0, r1) [ 244.944056] IPVS: sync thread started: state = BACKUP, mcast_ifn = veth1, syncid = 4, id = 0 00:24:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) [ 245.146259] device nr0 entered promiscuous mode 00:24:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) accept$alg(r1, 0x0, 0x0) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:17 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x8}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:17 executing program 5: creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mount$9p_tcp(&(0x7f0000000000)='127.0.0.1&', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="7472d590733d74637048050000009046cc87d48a7ba036ed998d7f45727f4677fc0f98a4e4c607fbf46d55fa63449344cc502e10cffa3660bbaae01e9d82faf462763dee7c0e1c914ce2ec91ff25d45e19f35ae80861e64db9b0709a4d98fba522e0aefc5cf1d5c6efa9de875d5acccc59cdb87dcb75bdb1e321f3afd755165363e0d754e3e4e0926bbe62ea6f4d9a9a4a828dab95b847c83b5e153d3f66bbc06ea0cf015554b8753a48dcab32b6239faf9a5fcc80035fe9047ab3063f87df55e59649cdf4e7c13bf1c66eeeeb9ae3fe90614fea69793f77c46a22faffbc428b924f6101712cefce0b3bf96a74cc"]) 00:24:17 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) 00:24:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc), 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x6, 0x2) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000080)={0xfffffffffffffff7, 0x8, 0x0, @random="a070a7077f11", 'veth0_to_team\x00'}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000100), 0x12ed) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x4b564d03, 0x0, 0x48, 0x4]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 245.621915] 9pnet_virtio: no channels available for device 127.0.0.1& 00:24:17 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) [ 245.753113] unchecked MSR access error: RDMSR from 0x48 at rIP: 0xffffffff811fae64 (vmx_vcpu_run+0x2164/0x2880) [ 245.764078] Call Trace: [ 245.766745] ? kvm_arch_vcpu_ioctl_run+0x2488/0x7280 [ 245.771896] ? vmx_vcpu_reset+0x1000/0x1000 [ 245.776251] ? trace_hardirqs_off+0xb8/0x310 [ 245.780216] device nr0 entered promiscuous mode [ 245.780730] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 245.780755] ? trace_hardirqs_on+0x310/0x310 [ 245.794160] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 245.799777] ? check_preemption_disabled+0x48/0x200 [ 245.804799] ? kvm_arch_vcpu_ioctl_run+0x393b/0x7280 [ 245.809905] ? kvm_vcpu_ioctl+0x1e5/0x1150 [ 245.814148] ? kvm_arch_vcpu_runnable+0x720/0x720 [ 245.819066] ? futex_wake+0x613/0x760 [ 245.822892] ? lock_downgrade+0x900/0x900 [ 245.827088] ? kasan_check_read+0x11/0x20 [ 245.831286] ? do_raw_spin_unlock+0xa7/0x2f0 [ 245.835735] ? get_task_pid+0x1ea/0x3b0 [ 245.839709] ? lock_downgrade+0x900/0x900 [ 245.843898] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 245.848843] ? get_futex_key+0x21b0/0x21b0 [ 245.853079] ? get_task_pid+0x211/0x3b0 [ 245.857089] ? find_get_pid+0x270/0x270 [ 245.861058] ? mark_held_locks+0x130/0x130 [ 245.865291] kvm_vcpu_ioctl+0x5c8/0x1150 [ 245.869348] ? kvm_vcpu_ioctl+0x5c8/0x1150 [ 245.873595] ? kvm_uevent_notify_change.part.31+0x450/0x450 [ 245.879296] ? exit_robust_list+0x280/0x280 [ 245.883641] ? _raw_spin_unlock+0x2c/0x50 [ 245.887824] ? __fget+0x4aa/0x740 [ 245.891281] ? rcu_is_watching+0x30/0x30 [ 245.895333] ? __kasan_slab_free+0x119/0x150 [ 245.899742] ? __fget+0x4d1/0x740 [ 245.903199] ? ksys_dup3+0x680/0x680 [ 245.906943] ? __might_fault+0x12b/0x1e0 [ 245.911000] ? lock_downgrade+0x900/0x900 [ 245.915143] ? lock_release+0xa10/0xa10 [ 245.919136] ? perf_trace_sched_process_exec+0x860/0x860 [ 245.924594] ? kvm_uevent_notify_change.part.31+0x450/0x450 [ 245.930302] do_vfs_ioctl+0x1de/0x1720 [ 245.934188] ? ioctl_preallocate+0x300/0x300 [ 245.938592] ? __fget_light+0x2e9/0x430 [ 245.942563] ? fget_raw+0x20/0x20 [ 245.946009] ? _copy_to_user+0xc8/0x110 [ 245.949977] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 245.955529] ? put_timespec64+0x10f/0x1b0 [ 245.959678] ? nsecs_to_jiffies+0x30/0x30 [ 245.963889] ? security_file_ioctl+0x94/0xc0 [ 245.968296] ksys_ioctl+0xa9/0xd0 [ 245.971742] __x64_sys_ioctl+0x73/0xb0 [ 245.975650] do_syscall_64+0x1b9/0x820 [ 245.979533] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 245.984912] ? syscall_return_slowpath+0x5e0/0x5e0 [ 245.989838] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 245.994728] ? trace_hardirqs_on_caller+0x310/0x310 [ 245.999752] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 246.004773] ? prepare_exit_to_usermode+0x291/0x3b0 [ 246.009876] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 246.014717] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.019896] RIP: 0033:0x457519 [ 246.023091] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 246.041982] RSP: 002b:00007fec79c8bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 246.049682] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 246.056956] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 246.064234] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 246.071510] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fec79c8c6d4 [ 246.078770] R13: 00000000004bffda R14: 00000000004d00a8 R15: 00000000ffffffff 00:24:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:17 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) 00:24:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc), 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:17 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0xffffffff, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) accept$alg(r1, 0x0, 0x0) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x6, 0x2) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000080)={0xfffffffffffffff7, 0x8, 0x0, @random="a070a7077f11", 'veth0_to_team\x00'}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000100), 0x12ed) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000100)={0x7b, 0x0, [0x4b564d03, 0x0, 0x48, 0x4]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:24:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc), 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:17 executing program 1 (fault-call:5 fault-nth:0): r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) 00:24:17 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:18 executing program 5: socketpair$unix(0x1, 0x20000000000002, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x100000000004, 0x44031, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='nns\x00\x00\x00\x00\x00\x00\x00\x00') [ 246.570353] FAULT_INJECTION: forcing a failure. [ 246.570353] name failslab, interval 1, probability 0, space 0, times 1 [ 246.606021] CPU: 1 PID: 9928 Comm: syz-executor1 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 246.614443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.623791] Call Trace: [ 246.623874] dump_stack+0x244/0x3ab [ 246.623898] ? dump_stack_print_info.cold.2+0x52/0x52 [ 246.630105] ? usercopy_warn+0x110/0x110 [ 246.630145] should_fail.cold.4+0xa/0x17 [ 246.643435] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 246.648552] ? lock_downgrade+0x900/0x900 [ 246.652731] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 246.657691] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 246.663235] ? pid_task+0x115/0x200 [ 246.666883] ? find_vpid+0xf0/0xf0 [ 246.670448] ? __f_unlock_pos+0x19/0x20 [ 246.674425] ? lock_downgrade+0x900/0x900 [ 246.678837] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 246.684629] ? fs_reclaim_acquire+0x20/0x20 [ 246.688958] ? lock_downgrade+0x900/0x900 [ 246.693111] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 246.698645] ? perf_trace_sched_process_exec+0x860/0x860 [ 246.704134] ? creds_are_invalid+0x140/0x140 [ 246.708573] ? wait_for_completion+0x8a0/0x8a0 [ 246.713215] __should_failslab+0x124/0x180 00:24:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) [ 246.717481] should_failslab+0x9/0x14 [ 246.721322] kmem_cache_alloc+0x2be/0x730 [ 246.725475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 246.731015] ? check_preemption_disabled+0x48/0x200 [ 246.736157] prepare_creds+0xab/0x4d0 [ 246.736213] ? map_id_range_down+0x1ee/0x430 [ 246.736230] ? abort_creds+0x2a0/0x2a0 [ 246.744416] ? __put_user_ns+0x60/0x60 [ 246.744457] ? fput+0x130/0x1a0 [ 246.744476] ? ksys_write+0x1ae/0x260 [ 246.759326] __sys_setreuid+0x108/0x870 [ 246.763329] __x64_sys_setreuid+0x54/0x80 [ 246.767484] do_syscall_64+0x1b9/0x820 [ 246.771432] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 246.777035] ? syscall_return_slowpath+0x5e0/0x5e0 [ 246.782232] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 246.787074] ? trace_hardirqs_on_caller+0x310/0x310 [ 246.792222] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 246.797240] ? prepare_exit_to_usermode+0x291/0x3b0 [ 246.802265] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 246.807110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.812295] RIP: 0033:0x457519 00:24:18 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000002900)='hybla\x00', 0x6) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0, @loopback}, 0x10) [ 246.815490] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 246.834827] RSP: 002b:00007f6098b83c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000071 [ 246.842649] RAX: ffffffffffffffda RBX: 00007f6098b83c90 RCX: 0000000000457519 [ 246.850022] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 246.857492] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 246.864759] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6098b846d4 [ 246.872116] R13: 00000000004c3995 R14: 00000000004d5958 R15: 0000000000000006 [ 246.979914] device nr0 entered promiscuous mode 00:24:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:18 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:18 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000019009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffefffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x7417, 0x23, 0x100000000, 0x0, 0x20, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0x0, 0x3, 0x6, 0x8, 0x0, 0x0, 0x0, 0x8001, 0x1, 0x0, 0x7, 0xff, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xf77}, 0x0, 0x0, 0x0, 0x2, 0x9, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) 00:24:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:18 executing program 1 (fault-call:5 fault-nth:1): r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) 00:24:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:18 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:18 executing program 5: socket$key(0xf, 0x3, 0x2) clone(0x212a001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000100)={0xa1, 0x700}) socket(0x10, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000000c0), 0x0) 00:24:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) [ 247.569907] usb usb9: usbfs: process 9976 (syz-executor5) did not claim interface 0 before use [ 247.584451] usb usb9: usbfs: process 9976 (syz-executor5) did not claim interface 0 before use 00:24:19 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180), 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) pread64(r0, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 00:24:19 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {0xff}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:19 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) 00:24:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) [ 247.691175] device nr0 entered promiscuous mode 00:24:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) [ 247.794022] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 247.806955] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 247.908307] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:24:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:19 executing program 1: r0 = socket(0x11, 0x6, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x101000, 0x0) ioctl$VHOST_GET_FEATURES(r3, 0x8008af00, &(0x7f0000000140)) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000240)=0x1, &(0x7f0000000280)=0x4) setreuid(r1, 0x0) setreuid(0x0, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000080)={@rand_addr, @dev}, &(0x7f00000000c0)=0x8) bind$bt_l2cap(r2, &(0x7f0000000000)={0x1f, 0x2, {0x5, 0x1, 0xd2, 0x7, 0xffff, 0xd9}, 0x2, 0xdf}, 0xe) setxattr$security_smack_transmute(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000300)='TRUE', 0x4, 0x3) 00:24:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/245, 0xf5}], 0x1}, 0x0) 00:24:19 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:20 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setsig(r0, 0xa, 0xb) fcntl$setownex(r4, 0xf, &(0x7f0000000000)={0x3, r1}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setreuid(r2, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000000c0)={{}, {0x1, 0x4}, [{0x2, 0x1, r2}, {0x2, 0x5, r2}, {0x2, 0x4, r2}], {0x4, 0x1}, [{0x8, 0x5, r3}, {0x8, 0x7, r3}, {0x8, 0x2, r3}], {0x10, 0x4}, {0x20, 0x4}}, 0x54, 0x2) mmap$xdp(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x10000, 0x0) setreuid(0x0, 0x0) 00:24:20 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0xfb, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:20 executing program 5: msgctl$IPC_STAT(0x0, 0xd, &(0x7f00000000c0)=""/36) 00:24:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="00000000000000001c0012000c000100626f6e64000000000c000600ffffffff00000000"], 0x1}}, 0x0) 00:24:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x0, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:20 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:20 executing program 1: r0 = socket(0x11, 0xa, 0xfffffffffffffffd) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) setreuid(r1, r1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$BLKBSZGET(r3, 0x80081270, &(0x7f0000000380)) setreuid(0x0, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x900, 0x0) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x6) write$P9_RCLUNK(r3, &(0x7f00000003c0)={0x7, 0x79, 0x1}, 0x7) write$P9_RMKNOD(r4, &(0x7f0000000180)={0x14, 0x13, 0x1, {0x10, 0x2, 0x6}}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000240)={{{@in6, @in=@broadcast}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0xe8) 00:24:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:20 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:20 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioprio_get$pid(0x1, r1) setreuid(r2, 0x0) setreuid(0x0, 0x0) 00:24:20 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 00:24:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x0, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x0, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:21 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:21 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/99, 0x19000, 0x1800, 0x9}, 0x18) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x4e21, 0x100, @remote, 0x5}, {0xa, 0x4e22, 0x400, @local, 0x3d}, 0x6, [0x3e9, 0x1, 0x7f, 0x1, 0x3, 0x10001, 0x81, 0x2]}, 0x5c) 00:24:21 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r0, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r1, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:21 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) unshare(0x20400) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0xb, &(0x7f0000000080), 0x0) 00:24:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:21 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 00:24:21 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x580, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xf}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5e0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:21 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000000)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) 00:24:21 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'brod%e\x00\x00d\x00', 0x20, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001200], 0x0, &(0x7f0000000040), &(0x7f0000001200)}, 0x78) 00:24:21 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x802) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']], 0x0, 0x0, &(0x7f0000000440)}) 00:24:21 executing program 5: 00:24:21 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1, 0x4000) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f0000000040)=""/255) [ 250.435530] kernel msg: ebtables bug: please report to author: Entries_size never zero 00:24:21 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) [ 250.496527] binder: 10170:10171 unknown command 536871488 [ 250.508648] binder: 10170:10171 ioctl c0306201 20000000 returned -22 [ 250.530801] binder: 10170:10176 unknown command 536871488 00:24:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) [ 250.560933] binder: 10170:10176 ioctl c0306201 20000000 returned -22 00:24:22 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:22 executing program 5: 00:24:22 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x80000) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000040)={[0x800, 0x4, 0xfde, 0xfffffffffffff831, 0x6, 0x1, 0xfffffffffffffffa, 0xffffffff, 0x68c2, 0x80, 0x0, 0x0, 0x8, 0x5, 0x3ff, 0x8], 0xf000, 0x800}) 00:24:22 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:22 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x105082) sendfile(r0, r0, &(0x7f00000ddff8), 0x102000001) 00:24:22 executing program 5: set_mempolicy(0x1, &(0x7f0000000000), 0xc) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x6, 0x209e20, 0x8000000001, 0x1}, 0x25) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000240), &(0x7f0000000300)}, 0x20) 00:24:22 executing program 4: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x20000002) write$P9_RWALK(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="16"], 0x1) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000040)=0x8) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") 00:24:22 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:22 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000000)=0x32) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x6c, r3, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1d}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fffffff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_1\x00'}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4}, 0x40084) 00:24:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="140e35f13e", 0x5) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x167, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x108, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0x7}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) [ 251.289576] device nr0 entered promiscuous mode 00:24:22 executing program 4: 00:24:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:23 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x1}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000080)={r3, 0x9}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, [], [{0x4, 0x5, 0x1, 0x101, 0xfffffffffffffc01, 0x11d6219e}, {0x15eb, 0x8001, 0x68d, 0xffffffff, 0x100000001, 0x401}], [[], [], [], []]}) setreuid(r1, 0x0) setreuid(r1, r1) 00:24:23 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:23 executing program 4: 00:24:23 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:23 executing program 5: 00:24:23 executing program 5: 00:24:23 executing program 4: 00:24:23 executing program 5: 00:24:23 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:23 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000000)=0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, r1) setreuid(0x0, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000040)={0x8, {{0x2, 0x4e22, @multicast2}}}, 0x88) 00:24:23 executing program 4: 00:24:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:23 executing program 5: 00:24:23 executing program 4: 00:24:23 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x7, 0x400, 0xe55, 0x6], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:24 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:24 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000000)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) 00:24:24 executing program 5: 00:24:24 executing program 4: 00:24:24 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:24 executing program 5: 00:24:24 executing program 4: 00:24:24 executing program 5: 00:24:24 executing program 1: r0 = socket(0xe, 0x80003, 0xfff) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x200100, 0x0) write$cgroup_type(r1, &(0x7f0000000100)='threaded\x00', 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000040)=0xfffffee8) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000080)=0x10000, 0x8) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000140)={0x0, 0x0, 0x10001, 0x1fe0000000000000}) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000180)={0xf3c, r3}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000000)=[{r5, 0x80}, {r4, 0x2000}, {r4, 0x2200}], 0x3, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setreuid(r2, 0x0) setreuid(0x0, 0x0) 00:24:24 executing program 4: 00:24:24 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400, 0xe55], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:25 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}], 0x3, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:25 executing program 5: 00:24:25 executing program 4: 00:24:25 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:25 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x5a3180, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x1) setreuid(r1, 0x0) setreuid(0x0, 0x0) setresgid(r2, r2, r2) 00:24:25 executing program 5: 00:24:25 executing program 4: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, &(0x7f0000000000)) 00:24:25 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:25 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000100)=0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) 00:24:25 executing program 4: 00:24:25 executing program 5: [ 253.996996] device nr0 entered promiscuous mode 00:24:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:26 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}], 0x2, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:26 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:26 executing program 5: 00:24:26 executing program 4: 00:24:26 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_emit_ethernet(0x4d, &(0x7f0000000000)={@remote, @link_local, [], {@llc={0x4, {@snap={0x1, 0x1, "13", "1b12ab", 0xe8ae, "80db823b19fdb7321aa04baad3f416456a094ffa0c29fe2094b6075a9933114cbbda45ed1dacbebda1a4a9750be2e976e8e6e3113db612"}}}}}, &(0x7f0000000080)={0x0, 0x2, [0x22, 0x977, 0xfa4, 0x255]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setreuid(r0, 0x0) setreuid(0x0, r0) 00:24:26 executing program 5: 00:24:26 executing program 4: 00:24:26 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$netlink(r0, &(0x7f0000000180)={&(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbfb, 0x48004}, 0xc, &(0x7f00000000c0)=[{&(0x7f0000000500)={0x1374, 0x3f, 0x400, 0x70bd26, 0x25dfdbff, "", [@typed={0xc, 0x93, @u64=0x3}, @nested={0x194, 0x7a, [@generic="53df5fe0760aad8c1963d65ab96a2c6639b740ab45f2b3a810d708c2061f9ad061ab30f87db1c3e245fe1997ab103a6dd9b4ad3a186def9711ed16181dc033cbb9935409d503b22bb81ed87443a6ece9a6d40adae30499af4f0d3625e7a25c3abc96017139b99f05d4d7bb26ece18a59668049ab059d8414d3e963ac0ea1c0b6e393651d42fadc0ca6ce44b7e44970bddd02f68a2a59d5e3fd2810971cc73b", @typed={0x8, 0x60, @ipv4=@dev={0xac, 0x14, 0x14, 0x15}}, @typed={0x8, 0x17, @u32=0x2}, @typed={0x8, 0x5c, @uid=r2}, @typed={0x8, 0x7e, @uid=r2}, @generic="7e8274e3964e386d2ca7992658600909d8ff35fdf864f663231e5fa88fc09520a7f877d1112a261a92bdd250b0f2ee0af6b8b911c58dc64ab257ba3c3cee0f4fd81da49e0ca06507953f4769b0cc5ec07fe2356b68f73d1f5090cfdeabef522d6a0f83c0d7312d9feea7fcf8b407dfae96e2baabc513d18e8c17531d38cf38e730b9ffb59bef1d859cc4597c0cb8af771e2238bdf7affe286bd340517eaab03d314c94a8618c73a926313a1b2d8296bd5a5d9b", @typed={0x8, 0x1b, @uid=r2}, @typed={0x8, 0x93, @fd=r4}, @typed={0xc, 0x69, @u64}]}, @typed={0x8, 0x2a, @pid=r1}, @typed={0x8, 0x63, @ipv4=@rand_addr}, @nested={0x1ac, 0x78, [@generic="7d2665e3771b0656d914b2a0c78cf88321a61cdba4ed884358d9e462b736b734747f9fae2b7468184c9b36ef4891e55152d8d57996d1aa89a3433b40cb4089f3d4fbe3ae3f0beeb3", @generic="4962e5423fc1d2ecf4188a3ab1a3bcfd27e09d919722ee7bdd82c858198badfe7a332dd01f9396aa0c0207a10cdaf82b265c1c36359a0aa68adc3b1831b6f39289a31496f3b7f546350f3944d53085cebfce12ef84e3edf02db0ec4e193e6a1655c0789f2548559ba5e199be432831469f57f126162f4fdb85158f2b54a08e901dcd8d44d72babc923b23739018d5d0dc684c7f8a5fe7ba7b3abcf8422062a37b52462abdf87c8163846aae248e35f06a885323c5fcab5e0f3f2e8dd80ef32b85965a812514b74b1903d4cff037ee9abcf68032922edc763cffb295e41883db24d39a7aa2d6835959b5b9735468c0e21", @generic="efbf25ed259f57f56d91e90230154e38d2b359b5670b7ab26a31e0ea5ba3c8e55925d5100b5a20bf23600904c507ffe0d28e9086e4df00a12800a94c431e212ba4a131bdbcc49fbfdaf1bdcce6351c14d6", @typed={0x14, 0x4d, @ipv6=@ipv4={[], [], @loopback}}, @typed={0x8, 0x51, @fd=r5}]}, @typed={0x8, 0x17, @uid=r2}, @generic="44c0cffb5ffd7a823b948896b6f82f11f53639acd1dc422169112de2488c6fc7784d878cfa721bc84fbf7690b60e460c85e4a700b59cae7ad01f7f0fd6a1b0db75e770f65341133cbf5f78e5fe7665f6c403e3ce37317ac7bcf28e6a939cc85a58b497ffb3408c224f19efcd26eb5dcb168c516ba35868ba934d4958cd5252808a9fb2ae2a979bdebc6ad09131a027f293c69d883f82d6e5317131165b925d1f6869c28150d9bf98de2681084345928a2330c0697bccf2ecaf47a8037c39ed667d3db714470d2f35105368ba749bdf3b8cb0067cf67a0636539649497e35f80cb176a608aa43ded710fc2be6f8a65eee65c7a4ff7a07eb4b73d90400236a8324c42dd0486a4868b8add8d65b47dac3a8f07191ef8ef5a7868543359470ae23556d116c6e46dc83cdfda52a5e983c1ff86a8ce47a43f0b950d888044cc13bdd05da98d32ce4a28ddb2abc6e994e40b7069bed86953fa9ddb91d591dbc0d30bc054db52afafd870c00dc4b1de20a222de528e5f96e2a5e0aafd48652f15a84f92350de84f66a1e001c6662d26c5ef88a07a4ed4a9236f2add325674c187490a6cf78c503fc52f463c9d8194eb2068e4bb785117c13ccc48b4fd52b2684862cf161f32759e357432fc1e7d8a6ea8cbaec3ba025e7e47d7ca3cb91a889af4783bc205cdd9fc6a1e3a0a68e4903db3281660d5be948596160aaea51c2675dc6e30101b74b20c9d58a12456b33fd650a272f8a24a4ff5ed9f12d47b94e01d704931ee1ca1b1532204cb26c26451d27513d95597282e7b4696eac750b309b7fcb3d3e015a2b4519799b4b071b2709b2d1be1f6c448be02d18bfcd9d596c789b5d7cfdfcc76be8e592ba2c184da5f0d3b43d41b23c8661fbd640a87611092d666e79e9a533af72f4e04627596f4b1708ffa0907e07f8df3a931899d13ce571a80d0ed3ffee15e49ed44a2f6d329e4c4b8eda866ad35c933b2ecdbb1fbb6684e24fcee8a46c1c102f5459e7db69c5f84c70e4f808ed4493fd3bbffdc30f3130733dde3a76da53d4117c185a5f366139ba506e764fe7f965de4978c9d117bf605f6e90a0ce771e6a993320f98911d2cbaba3596e253177b49c96c776c18d1436799ef78eadc7dbb9466b08273d9b22097672e4ceaa92d1980cad278306026f8e9c5c494946cf198a92f74845bc7237179325292ca4c8fe2abf2065e7bfe11f282c1c55e2e49914d34b7681787a7630c7c0762125ee6d585a77db3941b15b833a6082d893afc3a8f4a7d7590ea51b3c67c6a28e7253311729b6e49996ffe17497d944dca66b17db24c3dc20f3c38daa7ec0e9c5156eec75aa2447b1034cc7505a5a7b4be0d320fd5691c23bcd986bd9488e047cb4118a658a3b8d5e08bb61bbb753d06a0849e7723afd1c3cdc6325e19e8e6bc7e5df6325e60a042aec80c68379ae4bf63eef15eaf6b8d3ac41a1eb667266edb94726dff331375dbf70ceb4375752d894ba614c8b5a0bdfc6895e9a33fec2348b322fd3afbf36c30fd4b8e525d250f92f042b8831983aef4dcd114f064ac01dc257a5301872ecf2a132977fd994dd76272be3efe9c8004933aa53f2df8532544cdf07899973ad3ca4c931c87707cb539503ef09838b7ac38ea667f679aa8b9e17320531ab5c5e1684ce19d6b7bb3303e18fcc7e7630a35130a1b226ea2669986349ebf6f7093d82a9be4d300646dc3de7c1ddd9d55a3dde73ca50f2b7230e98bcfd1c5a81f82cd16bb1dfa19940b708ee21e8c0fc5a6b81b4b7780779c4b6f461e91041c6accd15b50d1849978aac9d3ec6d4f547c3ba5433971f1e13ce0889d161114ba92524858eccfd076f48c134d65db342f0238690449ad994ad84c836d09da8a5df8896cbdc89998fcba63ba16f010d82a7c13b4e1d6e0b191fdf22be6f7feb24ee10e1b2b81fe5d1af65b850be91cec39bb1a60ceb2a446a4a843737e44c5d5ba3855ec7c0f5386729582329e3f9a7e242e0dfb563e26554d2ee79af224095c1a18f38a14694a8d6851507d5e85e011ebc3d53a65b414050ed4ae15d2f8558caa936510838ef82d14e1742be7b47e300ca427fbffb23357df7c6bcfe62d52f36344d36771f2526d42c18a5e62b6cc1c54f29d086df11cc1b095fe2457a4153ffeab23e0418b399ec9e5208939bcc00eb668989ee09799ac3c8577372b3adb3499f6c0a6c58805f6f786d49536aa5810ea13ae85f532637d750fd4d3ee9e7e719cd2cb0e49900fb954b0154323e1a841adfdda4d2a740ae7a2e5a1203874e653269b2c6663b9e348e93ce2a18fc5f94d61aa6e38ef35a0a4b4315527298e570c2f5d30f657dbadf7bc29c5cccf14599e8b5af6524511e906b66ec8daf5c12cc57a278a3ee8a1cc88a2622e7a9b44dc8c759dc7e866f57e3ae214533ca2d8d8e1a91a830f5d9f3c01ae5cbc1088813744192a98085b38be26156806b8e9e82d07d73777f24882cecad85c31a510152deb2c1ae11c41d861b9f7eb8b6bc18309e6c22ad3f5555f9e784d73d63c4d546c0ca308d036ea6cada841208ea6cdd86c3f7f4a40c32ac56a9a109a5955b34918789a4dd4a7e37a97216938705065186ff0307ce0b541032c8d01707063b60d1a8e47338ae659c1207755a02f5b61b4e5c4ac6acf25ae0c0894605daf850ca5b44adf52407f9fd5abc475c9b57fc7a0eaa3efb3e2c725af0617993054a29cf4c2761e57b645400574f8dff8ad32d6999eb78714c7a41adeaae5b12a28dfcb069957418ddc7c15c9535e76948e157289f72b6d73a8e37a554299314da96f25bfb512acc38b51b1f1d5d0b9f1c02a654e66e18c7f171407aebf30bba7aaa4f884664135d522de306ed80bf9bff723d9196148041fa505758c65da1b5868e9e1b1a4f5aaa76539b969649d5ceb89a93492e116a0082953c5e289c289b55c765b4c0878e3a74630756e2d4a068c5a3f73063c7bbd6da5469a35d7d9e2f386e3072124c4e2cd855ea65dd4ed230fa4d807db4d19296b23dc61935fea6c7639590831c39c2d44f9bfbd37b83519e794cabfe7da5e41900905f795dca35b5a6eec2a1fc1c4c78e49e7f9892c7b177e1443311b765f58d9660fe54fcec9b8e54bd1147edb4ca55161f22825c65dcb625a5144b159bfe27de43025f9124c8b69461deb6bd758c5dbbc98191b09f6ca8674c2fd7ccbe47fddb9e32d6ff981fa8fce8f4ecedcf23c72c15c25e0b5759f747290761559d068b0041b8ffce77a7e183a8268b5a5e6d5cc081c0af3c757ee6e950bb2ca935e103da6b2d8e57b12fa190c023a6be6fa414800748c8408af3a907e465e7853dfa06ba98eb34438f59638217a44a0f15896ae89e72f0bffdfc56e5f58761107f6ffc6c2dabe34d61260f93be23c73e7e011f9a20e391f3b911afb2cf731746142e66e08248527c1c8cf633d4803d85074ac1637ec708eb745dbdbbac3f49a1ff231a8338afb26163dfb97e1ca405b99bd92d3bfcfc105c71479d830ad960a4387b774870ffe20ba36ab7ae756f708fc391222ed8415d1cd980640e90dbec61fb71cb892d2472f32a3372f3901b7bfe2da3c2622f9e8a268c98aa7b29528dd7664170426ec3ad0d666afc8444da70f7cab6e452c29d4e35b6e1efc3dbd1c6fd1136a8ebf72715d8cf89587ddbabb77dd40119b8f68b4aec63504ca437150a14d6369585c08234bc4b456e54566cac4c989b4d349d9fd9b5022b58d6c0a93b5e905783bb40f7384d60b282e48410a2b16b29e55007c4412d2330deaa270851d9a87e84b5d77f0c2e1c5567761783339ed54fa2c9e8d92a261c8452992b05e40440de2415cd2125858aa3962beb1e5295f02cfc706e9e8c013393d906fe9958d64c328b6b0215320f0339aa33148df599660ccb1244447a655d41e3045a74ed1673dc91b38d529f27528e2652d032d809ad73566a08c6b73aa5a214b627a2d3e1f4bb3a2360849a77c11aec678c713f41a2bc579064f01f12e91c8fa1998ff00cf6f1942855212f72fe6c7550a1928e3c8a6ef1716d88d7b54577f0a4acb27775c4d2dcb7ebcd8be30c0b4c35982302d9389e62ab481f8d8b16438d985bb8c24952239b8eed9d6d505ce4ae00fd4b0499cced17057bef33adcc479cd2a0b0bad7926e03517d961cf35dc4c19fcdcdc6c07dbcff8cfe9fbf9722c65c4bdbff087199dc093bb51c1cba7f8007693e7614fa8daac6c387bee12281e1898cb34d2fd104ec98291b52ebee274227982ac6d7d7d86bccac4e9409ec21b2eb7aa62cd40ac8cded4d5a96c097f15374b88497f9f4603440107b963e13840f49d39219d4d82cc8f78e19bb271a1a5e20315a2c5b6ebb22f6362070e10cbe5e9ef741ec1578bd1a04c88f46fbc27da1ca05100a1eb39e181f6c6ab23e08f3627a062c8ef389ad56f71f96df7c01e8b76b81c028b1a51987340c5575f3177bb686768726fb691aa9e0d16ef52cf4f612c8d172ccaf8cff36765e2c3cd223324ba789d1c34915d074d80f2c90c8023724c5777e572e8fd9ab27f9dcc7837f43a968f8b4d7e19df71342c00e325c0bdd901ab3b7874ba10ce711a6da8ed11fe5d856c71379d5a551116506bac00c41d504c50e9d55fe9bfaea3ca0ee5d800e1f06ec4ea07b9f80555d20a32c5ac32641882803fedacbaa596b97d62785bcdd1b43eda0bd699b39d2854a0e32a01bc8b61b3b35f2e5aec4052838662ca6bc5baef3651fcab303a8a1478df94c527fe4456992b38536867c85882c490c0aab580461a52579fd20918f2fccadbf09d990961ab54a390497a1fd03c000e54d1a21a4fd6d9223940aa56053aa9490f0ecb432681d13e8c7689e25723944c18e08161085b3626063d9a57d945fcc7f5baed190a89c491b6000d483c1e5459804450e7a28c97129f6ccf261b66313c767aa8f8a90de001cb7b11a3c5abe8adf9cbe724f6a29766b79d19ec4a876fe4448df2d0493d853131713a1926917e1f6ed6ed88971d765be572d900afe3bb9370a50ded3e0a6ba1b673c1d3c55e91f43ebf2e5ed9ed30402074b648662a64df2443f3c5d22ad2b16d16329e49848d1cc13c29da940a7ee8222b6b3b19e5253b91895e49ed58c8fe5a28adb136df4db8d563fa19730e338df59414e4a73d587dfcca29dac791929bc72f280c6d0404743fd1c5e9fe0ed48630eddc469f592dabc0d67347fc42fc8be7f03c5c7578aca0572fcab12d15f5f00fd3f25b82a3ac98bbc5186b7db8ac46c7f1677be9d01c97ebe64a2330baec8d70fe9ae2a7be07c2514062ec6e5a98a9adb9be67a95c2b888ba7f2645110665271820cbc31d2b2d800c90b484173c9c431b06d1d53b06a33a166c1279ab1daa175c2ce3156a784372bfefa5fd4ee856bdede7073c32f81780ba8993873bd95a92fd0533317e15f7519ff7cf7607518a8c4ea8584c970980dcc4632414b3eac0a5eb76b53a499f0292d85598a26f4e444481bdb19ded3e40b03a26b4eb8b242d0a8523e03934112036517c8029bf33e112ab039abae149fc0c9ca9bde09919d79357acc40510de72e75fc5d379db15df2d12d2e2eda25cbf8078681628e5e3fa7bc227a40c5450d71d85564114a485e496867ac5ade57347d4361555e75c0003c28c11a6a78a4bc0d2584efabce955e8cd6eb1e7b2eb7bc6c93f35aa2c3377cd1ea480fc3a252a53a9756eb28e6324ef2d8fb6463dfc62ecbc8922a13937799dff1cc08465340786fee9e7fcba15f4390a1731b0a5fbb01048b8cd69cdc6c0124c89e048bd9f45bf7f2b491424663cf5124317418e"]}, 0x1374}, {&(0x7f0000000080)={0x20, 0x10, 0x0, 0x70bd27, 0x25dfdbfb, "", [@typed={0x10, 0x5e, @str='/dev/dsp#\x00'}]}, 0x20}, {&(0x7f0000001880)={0x1368, 0x2e, 0x100, 0x70bd25, 0x25dfdbfe, "", [@nested={0x1c0, 0x27, [@generic="fc602e3b404cd806e08dc530a9f680905d4ee2aa85aafd6f1320c99801e4c683803ff515d7155d07ebb475c99c069e3b110030de2d5c26ed72f7dd653ed7d5c438836c521476d3c2cf0186bd75b40dd776e7d28fbdefb7eedbaa31b9f6aa321adc44c537d43174b56e5bfc364d21694853c4ef2fc5a5208183eec224ed6cb46f7078c5eda90d0fd97dc3", @generic="16937f2166fe8644628b1b0769decc49f4c55b2b8677d5244ee7934e", @typed={0xc, 0x90, @u64=0x8}, @typed={0x24, 0x13, @binary="890024c5965e763cc1d80b2ec3a80765d06435ce6b13d6971e5a059da2"}, @generic="9d54e0a5ad2cf2cf92fa83794efaa8f02730d4959f356eecd83d9a7ad3de4a1aa5f503f7ad7170874f8590b65c2206e10affa471edbacb4e6b1b20abbbdafc507482da429fde61650e1abf956371bf80a64ffdca48920fe1804ebfe6d7702321672fa9dd4fada5d8f01042718fa6817f79efbd34b45ce9d81914227912e85559baee83c230c9f18a5fccc98d1fbd390346b03c479c", @typed={0x10, 0x75, @str='vboxnet0${\x00'}, @typed={0x10, 0x8e, @str='/dev/dsp#\x00'}, @generic="bd3b0a6d26d1df935d48045d51ab3afadb7747a64d40155af813c7c6456fff6ee4aa7f09d30143e7b1e0f24a1af8"]}, @generic="4cd7c1a6d91223c5ffced8143cde988f94f7b08d64ba4c3288800810a2358bb5429d24a8dd55224a7374ec041c1cdacb36ed40676f537ae8b9057263fe1c55dc08c3e83faeb6074a314ef02d8cad72fdb71fb853aac7f10c29dac1c92624a829ca0d0592417533b84c19b46e01812c88453c1835caa868f75f", @typed={0x8, 0x90, @ipv4}, @typed={0xc, 0x5b, @u64}, @generic="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", @generic="3bdc5d0e095fbaf55835963d71f9c4fc34dea5738a68c5330f6bae5299af5f0fe711226aea515b6722772b53e2e76a4efd01a46c7d70a3093ffb123681e126c6468444f0de74d375d5d0054d5d5203b289e4d73aa3ba9261a4a6f7b1c13db161da1ad76dbd15f5fa9b1d372a51a5100b148525b915a72c8763fd5fc9", @generic="b2a2f7385e7c2ee7c411710724509dc8f2916affa69e8d477990b80ddaeb8738e7bb208944f1d0190a99", @generic="f71c9eae9d854c53e9e9274f63f0041e62ee8dabe3dc1c954b5efaebaa465e5a163ce3a8ca5ce0cfc11801056edb6b992aca0c043fa85763e9ef10503b0666d7beb24e138a425c936f2064", @nested={0x18, 0x5a, [@typed={0x14, 0x8c, @ipv6=@ipv4={[], [], @rand_addr=0x30000000000000}}]}]}, 0x1368}, {&(0x7f0000002c00)={0x750, 0x21, 0x204, 0x70bd2a, 0x25dfdbfb, "", [@nested={0xa4, 0x6e, [@typed={0x8, 0xf053, @u32=0xfffffffffffffff9}, @typed={0x14, 0x3b, @ipv6=@remote}, @typed={0x8, 0x42, @u32=0x3}, @generic="83023a535fa643dea52269d660cc4282ba2cc796ed405ac6e274837a0ccf27fef882016e1a254b5010656a0db66769b79ba2ae394d7d28cd8b88ff473367299adf91babfb9e7da0a23aa6015323d8da4338ae83710d639ea1344fc2492a3d740072f5d5b96781f357478859a490304973e25f0cd0a45f9bafeee35"]}, @nested={0x188, 0x91, [@typed={0x8, 0x5f, @u32=0xfffffffffffffff7}, @generic="baf186f7de1e87391962fe29b1f68c80649dbc4937c6b5c23e84a36548444de24127c827f879202a2d479c9ffb50a33a78c937d5190f8ff0cf1a1322e3e1430b7badd7d9e8300d3adbb0c2c8497f20dd39c193d994b03f45b1611b5abb84306f7a7bc857eca1a9f600a456aaf35e17140c441f387e3cdefe319c456687da92ea4c76c99095390c45e102b3ae2aec0829c93a5abecb69ebb37f8c42510824bec985b20b03bf24863a3a1304c4bbba4d2c92118720e35fed2ca53ee429674b406cd49627a4f0001d457e4c5d8e32b53f", @typed={0x8, 0x4f, @uid=r2}, @generic="f5f44d1c388af7a26d54a25f31b75bcdb0e48602777eed364285e581172aa786fc49415930e2a0497e5503cb247054074570e0066eea2a1d8060183ea2705d803307a831b260089ddfb9a12ced173e21f78940f97f8e0698e0c7690855e3e3d02c21c42a60caf636f2d2d431f5ce4ed84046fa4d51ff54cacece26dea8c6245da3bf900d96f6b4e57bda7b68e80764cb9a2343", @typed={0x8, 0x33, @uid=r2}, @typed={0x8, 0x6a, @u32=0x10000000}]}, @nested={0x128, 0x23, [@typed={0x98, 0x3c, @binary="5d11ade1053cc2dc83d43ff2b75def9354740d9fdf9ae8ecd74127ffccd225da1f721660ac698694cb7ada054a126af4a54a8fdf495f7cd58daeb791ce549b15b4c9ab5aa47d6c28ed7adf4504b38746415f0b25ef440e6b04d8f67e6f0f02bfb25560dc65763bd7e38f60076debba4615ded722898db35b812b402f842503937dcdf5c068489cfe06d59f687c20b64caa"}, @generic="f8c61dbb22841bb2882e2fa8f6a0f629f7d88f529b3b406c470db037fd541d1f48a801afbfd5cf1f6581876a6153f47fc5b35f0c63e0a6da8545cfd47b574ac31fc94b292f2cf2929d639cb44289ebb3d3a00ab20d1f186a6186e04ea73a5af3f55a4a96135c30d98fcc0743db6bd5fd7b4a8bf8166dfe", @typed={0x14, 0x38, @ipv6=@local}]}, @nested={0x180, 0x39, [@generic="1f01fdf6aff430f779a53baad0577665d99e3b3e53d20a940b6f3f56574bf659f9bacc5189450fe76c83fbb9071aa1f71ab47f6347f2dbf87d9f6a8aeec1594523c6e03c71a07c8cf9d9dd5c3ca8fe977ec727a6e20f6d0b3350078b313893726c09d7c82d20b84c1720461ecdfd17d979f02c221af192fcc9ed85b5abaeee176043d6297d7888d368a2b400ad1cde3826dbab0e0236d8978582c578f051817ba920eb6c1855b60545b025", @generic="88e1b40cbe6824bc8d96e84e0c38a6d8725b11ebf00ce0894b26b6328c1cf2a24d225055bb2883ed823a40dc95c250d7849a0c2e25ea29986e54a32a27e1cb5c0eaa3afcdb2410af55ba2d8e9b685174ec6e53e8d14e3d1008f26e6f9d1b5b403df02d1cd1373b963681497195b937f68f8678f0dd55a5d829fbf4c93ca7820058a95523688ba76369080987fe504b652c4fd91ff1423fcac61beb35fd5a1e423667e40361c82949e1a38bc5ab03375c1b", @typed={0x14, 0x33, @ipv6}, @typed={0xc, 0x8c, @u64=0x5af0}]}, @nested={0x184, 0x70, [@typed={0xc, 0x5e, @u64=0x3ff}, @generic="517e51d7b2b7bf60723f148c52e6e5e6c6399ff26d7fbf062f589e33ad9ec89a80f735c9d52868e97f7ea21c545a662a922dff656fc38551e413d20ab20dc8030e67d83f61bbc4e843434c472d4a7b1e28c3a688ea45f94e2ba1ba55d6269ae86d3d7309acae4c2caf022affb03b317490fc94b3d46a3dcccc373272b11c776c3dfa", @typed={0x14, 0x7f, @ipv6=@dev={0xfe, 0x80, [], 0x1d}}, @generic="30e9796e4b27ebb93459d4849644ea5d6b2ea6d06df484bed16896dbe1bf583ede98b83f549c7f9715f2467f96514a56ed5568e2f910bd59405b49c7707c5aadc1f4b332698481454395b74fd4babd75307cdd1f07f299aca23bf3d89f7dfcd57ae078b481b58b2600e911ac598fce553230c01d8cfa85110e4b582f33ee60bdf7f0063c3235f653f1f989a67d9eb852799c6276fbdbbf80e698177ce8a3257fc3f86ece3f6f4cf8265c1a841a1a7173694457a9332f8650d676098d3f0fd8a3206a1ff7562f8154b6ae456c00db967ac9d5c1a5c1ef7c51eeb3ee99de18"]}, @generic="640fe867d4f8be0b794aa0eb7b", @nested={0x34, 0x80, [@generic="1128c5db1dc11a7d5e293fca6c83f52b816d484d8c793d179e5874c05a0dd884fb6561a0f907a52b82f57ea3da"]}, @nested={0x88, 0x66, [@generic="8a8d91ad878a8461e49bf29287461b723a1a35a7f3db89ccdf80a773e9343ae490880e5caa40375ff4f656ba161f85a045abaf5503b5abc2f229ebe22824530069f6c1805241eb1f0f0677d104bd173422e6b54367b49a1004326a4a7bd3ee1b37ea6de3809b0277ec19fc753c74cb52cbca98958ef0c37e8d5e1c26ec43f817dc"]}, @typed={0x1c, 0x32, @binary="077e6da694e08ec8b2d7cf284dbb45fe6f4ae334f672"}]}, 0x750}], 0x4, &(0x7f0000000100)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r1, r2, r3}, @cred={0x20, 0x1, 0x2, r1, r2, r3}], 0x78, 0x4000}, 0x40800) fcntl$getflags(r4, 0x0) setreuid(r2, 0x0) r6 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7f, 0x0) ioctl$NBD_DO_IT(r6, 0xab03) setreuid(0x0, 0x0) 00:24:26 executing program 5: 00:24:26 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:26 executing program 4: 00:24:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) [ 254.964454] device nr0 entered promiscuous mode 00:24:27 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}], 0x1, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:27 executing program 5: 00:24:27 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x200400200) getsockopt$inet6_tcp_int(r0, 0x6, 0x1f, &(0x7f0000000000), &(0x7f0000000040)=0x4) setreuid(r1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0x2a2) setreuid(r1, r3) 00:24:27 executing program 4: 00:24:27 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x0, 0x400], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:27 executing program 4: 00:24:27 executing program 5: 00:24:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001780)={0xffffffffffffffff}) write(r0, &(0x7f00000017c0)="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", 0x801) select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x8}, &(0x7f00000000c0), &(0x7f0000000100)={0x83}) close(r0) 00:24:27 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x0, 0x400], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:27 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/unix\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000000340), 0x800009) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @random="e3610f4fb892", [], {@ipv6={0x86dd, {0x0, 0x6, "80a8a8", 0x14, 0x0, 0x0, @remote, @local, {[], @tcp={{0x4e23, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x41f4}}}}}}}, &(0x7f0000000000)) 00:24:27 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x801, 0x0) setreuid(0x0, 0x0) [ 256.027741] device nr0 entered promiscuous mode [ 256.039967] device nr0 entered promiscuous mode 00:24:28 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:28 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x0, 0x400], 0xc1, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/unix\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000000340), 0x800009) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @random="e3610f4fb892", [], {@ipv6={0x86dd, {0x0, 0x6, "80a8a8", 0x14, 0x0, 0x0, @remote, @local, {[], @tcp={{0x4e23, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x41f4}}}}}}}, &(0x7f0000000000)) 00:24:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) 00:24:28 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, r1) setreuid(0x0, 0x0) 00:24:28 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) write$evdev(0xffffffffffffffff, &(0x7f00000000c0), 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000440)="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", 0xe12}], 0x1, 0x0) 00:24:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:28 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}], 0x2, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:28 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400], 0x0, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:28 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup(r0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400000, 0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000040)={r3, 0x8, 0x7, r4}) setreuid(r1, 0x0) setreuid(0x0, 0x0) 00:24:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) [ 256.980620] device nr0 entered promiscuous mode 00:24:28 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400], 0x0, 0x81, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:29 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:29 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000040)=0x7ff, 0x2) bind$rds(r0, &(0x7f0000000000)={0x2, 0x4e24, @broadcast}, 0x10) setreuid(0x0, 0x0) 00:24:29 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400], 0x0, 0x0, 0x7ff}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:29 executing program 5 (fault-call:6 fault-nth:0): r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:29 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}], 0x2, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) [ 257.782699] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:24:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(0xffffffffffffffff) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:29 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:29 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) getsockopt$sock_int(r2, 0x1, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 257.925544] device nr0 entered promiscuous mode 00:24:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x11, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:29 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x3, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0xb, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) [ 258.025514] device nr0 entered promiscuous mode 00:24:30 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:30 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x10001, 0x9, 0x10001, 0x0, 0x3ff], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:30 executing program 1: r0 = socket(0x800000011, 0x80003, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) 00:24:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000200)="153f6234488dd25d766070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_RM_MAP(r4, 0x4028641b, &(0x7f00000000c0)={&(0x7f0000fff000/0x1000)=nil, 0x7, 0x5, 0x8, &(0x7f0000826000/0x4000)=nil, 0x2}) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2000, 0x0) ioctl$PPPOEIOCDFWD(r5, 0xb101, 0x0) 00:24:30 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x22, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:30 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x10001, 0x9, 0x10001], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:30 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuseblk\x00', 0x80, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0xa00}}, {@blksize={'blksize', 0x3d, 0x200}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '*\'\\eth0'}}, {@dont_measure='dont_measure'}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) [ 258.910350] device nr0 entered promiscuous mode 00:24:30 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x10001, 0x9, 0x10001], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0xc, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x18, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) [ 259.030932] device nr0 entered promiscuous mode 00:24:31 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:31 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x400, 0x0) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000300)=0x7) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x0) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) ioctl$int_out(r1, 0x2000000040045731, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe8, 0x100, 0x2781, {"b37668a306e508d4bd2f571a40e3f8235e91ba029160e96f64cb1cc9936a3c9b81cc775645411b13cde89eac7f4f7c035aa52c0bf9ff0e65f223522ee3aa0fde4278cfbb6763d2dbd0db953e885138ff3ebf752d0a72aa4917f9e8d847f1c392e4c975387dc60ea913f3d8726a5f91c18d5aa56fc78697ef9ec7bc3337514be595d48fcfbc2671905ce83a2df4f831c63ce90e58ba4d099d546d1001a215fc404c1df8392bc4be6ea79daddb791cbf61181b2a58020ac99237afc786fe17ffbbec68b6de75d0b7334b508e64331a135d2b7950a0bfe76a6dbd025d134d9f7fec22eb3e66438e59"}}, {0x0, "f9edbd520e84466e9e9d09203a6c08bf909ee33cf7084eda11169a721f0d05422cc20f55c12eecbc8baa6ce5bc7c6b155437a81a1fac1cdeac956efa0e59887203a1ad9f0ca87b31274fbbeee25ff99705737e751d5e55fc66f53c229fd0003b76119af8fed8b8a9fc710e91fb19750c0041ac3c67142823d2ada5c1940713f8429cbeec39465f14634b8a67963bef6d131d0bc5c87d"}}, &(0x7f0000000240)=""/58, 0x198, 0x3a, 0x1}, 0x20) 00:24:31 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x10001, 0x9], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x10, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:31 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) ioprio_set$uid(0x0, r1, 0x40) setreuid(0x0, 0x0) [ 259.893071] device nr0 entered promiscuous mode 00:24:31 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x3, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$minix(&(0x7f0000000200)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000040)={0x5, 0x80000001}) 00:24:31 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x10001, 0x9], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:31 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000200)=0xffffffffffffff3f) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCNXCL(r2, 0x540d) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) setreuid(r1, 0x0) setreuid(0x0, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00'], &(0x7f0000000040)=0x6) 00:24:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x2, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:31 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x10001, 0x9], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) [ 260.038013] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop4. 00:24:32 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:32 executing program 4: r0 = socket(0x10, 0x20000000802, 0x0) write(r0, &(0x7f0000000000)="1b0000001a0025f00018000400edfc0e8000000000000000000000", 0x1b) r1 = open(&(0x7f0000000440)='./file0\x00', 0x10000, 0x80) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000480)={'ipvs\x00'}, &(0x7f00000004c0)=0x1e) accept$inet(r0, 0x0, &(0x7f0000000100)) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuseblk\x00', 0x1000, &(0x7f0000000300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x6}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x8b}}, {@blksize={'blksize', 0x3d, 0xa00}}, {@max_read={'max_read', 0x3d, 0x2}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x800}}, {@default_permissions='default_permissions'}], [{@hash='hash'}]}}) 00:24:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:32 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x40000000008, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x410200) setreuid(r1, 0x0) setreuid(0x0, 0x0) 00:24:32 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x10001, 0x0, 0x10001], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:32 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0), 0x0, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}], 0x4, 0x0, &(0x7f0000003b00)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:32 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000001c0)={"766574000000000000000000bd6800", 0x43732e5398416f16}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'\x00', 0x404}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rfkill\x00', 0x1, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000440)='/dev/amidi#\x00', 0x1, 0x2000) r3 = accept4$inet(r2, &(0x7f00000003c0)={0x2, 0x0, @loopback}, &(0x7f0000000400)=0x10, 0x80000) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f0000000280)={'broute\x00', 0x0, 0x3, 0x5b, [], 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f0000000200)=""/91}, &(0x7f0000000180)=0x78) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000040), &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xa}}}, [0xfffffffffffffffa, 0x7, 0x49d, 0xb6, 0x0, 0x8001, 0xedcc, 0x8, 0x2aef99fb, 0x1, 0xb, 0x4, 0x0, 0x2, 0x7fffffff]}, &(0x7f0000000000)=0x100) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000580)={r4, @in={{0x2, 0x4e22, @rand_addr=0x9}}}, 0x84) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000800)=0x0) prlimit64(r6, 0x4, &(0x7f0000000840)={0x2, 0x1}, &(0x7f0000000880)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f0000000700)=0xc) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000740)={0xa0, 0x0, 0x6, {{0x6, 0x2, 0x3, 0x80000000, 0x174c000, 0x5, {0x6, 0xd2, 0x76, 0x10000, 0x0, 0x10000, 0x401, 0x8, 0xffffffff, 0xd05, 0x2, r5, r7, 0x76a8, 0x7}}, {0x0, 0x4}}}, 0xa0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000300)) 00:24:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x9, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:32 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:32 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000000)={'nat\x00', 0x2, [{}, {}]}, 0x48) 00:24:32 executing program 1: r0 = socket(0x1f, 0x80005, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0x5) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x6, &(0x7f0000000400)=[{&(0x7f00000000c0)="844ce6a13d8bbcb4ad170401911676dcdd", 0x11, 0x9}, {&(0x7f0000000100)="abec8d6c99", 0x5, 0xbf6}, {&(0x7f0000000240)="31f857732da1c46c8731dafac0e9aea3940d7d7b1503819e22d545bd77b190ebf99ae42d752c5d74a99ab784f8b39e66607a26502e86eba65baa20e9d7d3ed0dc2b1c4cc12bf9dcaf542eda1d628d79685aee7f147740dc6e078e802c72e27f684df933676a16b6492b41de4e17617c14f776eea046b340dc9b752394c87ec710c01c45b80dde3087dfcbe567cc001a27372f97b00c3e2b6b93a5eee777c301463d583fb8bc8b8473d6a588ce38948fde461d581ae7a3546f02848ed3113a2193ac25a051353a2a2ccf2add05e5f35", 0xcf, 0x5}, {&(0x7f0000000340)="885ca50bdd1697c331e6d320e044ddb78aae60745ee4d2afcc689edca18f5148e52e2170f5dd3c10e0c7a4a80dd92097f270a918d274dcfbe9b6943ae5db8a216fe80fe14420ec22aa39bf8f2ae1a466e6d248f9f3bf4bd3e4bc76e58f05bdca847fcf40250baf016ca27b7b4107d7553aec4ef78ab2e40ae7da0a443e99d6d2ae3bb13f8c34d365399ab5948a3b44227509f7c430766a5ba61735f5ed84a97a22", 0xa1, 0xcb5}, {&(0x7f0000000140)="8d4b93a0cdc3932aa71e91c6bae4364e134dad36cb12536658adff27844cdbb48084006e228856e8249561e1748e7002087d9be6eba2913929382d2e0f5ace0eed05f2", 0x43}, {&(0x7f0000000500)="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", 0x1000, 0x61}], 0x20, &(0x7f0000001500)={[{@nodots='nodots'}, {@fat=@codepage={'codepage', 0x3d, '737'}}, {@dots='dots'}, {@fat=@gid={'gid', 0x3d, r2}}, {@fat=@nfs='nfs'}], [{@mask={'mask', 0x3d, '^MAY_EXEC'}}]}) setreuid(r1, r1) setreuid(0x0, 0x0) 00:24:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x21, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:32 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:32 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x5e4a) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xf96d) read$FUSE(r0, &(0x7f0000000280), 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fallocate(r0, 0x3, 0xe0ff, 0xfff9) 00:24:32 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x5, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x6, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:32 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0xffffff1c, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @mcast1, 0xd028}, {0xa, 0x4e23, 0x4, @mcast2, 0x7c}, r1, 0xffffffffffffffe0}}, 0x48) r2 = socket$inet(0x2, 0xa, 0xfffffffffffffffb) r3 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f0000000240)) getsockname(r2, &(0x7f0000000180)=@l2, &(0x7f0000000200)=0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x20000000400204) setreuid(r4, r4) setreuid(r4, 0x0) write$FUSE_GETXATTR(r3, &(0x7f0000000140)={0x18, 0xffffffffffffffff, 0x3, {0xffff}}, 0x18) [ 261.568518] syz-executor1 uses obsolete (PF_INET,SOCK_PACKET) 00:24:33 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}], 0x3, 0x0, &(0x7f0000003b00)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x5, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:33 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x10001, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:33 executing program 4: syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xc, 0x1) r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$int_in(r0, 0x5452, &(0x7f0000000200)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_VL_CLR(r1, 0x7014) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000240)=0x4, 0xfffffffffffffe8d) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/netlink\x00') sendfile(r4, r4, &(0x7f0000000340), 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, &(0x7f00000007c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KDSKBLED(r4, 0x4b65, 0x1) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000280)) r5 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) fchownat(r5, &(0x7f00000002c0)='./file0\x00', r2, r3, 0x1500) ftruncate(r5, 0x80080) sendfile(r1, r5, &(0x7f0000d83ff8), 0x2008000fffffffe) 00:24:33 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) 00:24:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0xd, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:33 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x0, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) [ 261.873136] device nr0 entered promiscuous mode 00:24:33 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:33 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x0, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x17, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x360) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) sendfile(r1, r3, &(0x7f0000000240), 0x5) 00:24:33 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000200)=0x324) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setreuid(r2, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x1, 0x40c003) ioctl$KDGETLED(r5, 0x4b31, &(0x7f0000000280)) sched_getscheduler(r1) setreuid(0x0, 0x0) r6 = open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x80) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r6, 0x1, 0x1, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000100)=""/166, &(0x7f0000000240)=0xa6) 00:24:34 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}], 0x2, 0x0, &(0x7f0000003b00)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:34 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = getpgid(0xffffffffffffffff) ptrace$setopts(0x4206, r1, 0xbb, 0x100012) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f00000004c0)={@broadcast, @remote, @local}, 0xc) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000300)="67660f3a400300baf80c66b85fbeb78066efbafc0cb0e3eeba200066edc30f350f20e06635200000000f22e0660f3830b3708f3e0f060f01712166b9800000c00f326635000100000f30", 0x4a}], 0x1, 0x10, &(0x7f00000004c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/mixer\x00', 0x40200, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000400)='tls\x00', 0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r2}) ioctl$DRM_IOCTL_AGP_RELEASE(r5, 0x6431) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000440)) r6 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x0, 0x40800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r6, 0x28, &(0x7f00000002c0)}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r2, 0x4008ae73, &(0x7f00000000c0)={0x3ff}) r7 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x40000) write$P9_RFSYNC(r6, &(0x7f0000000000)={0x7, 0x33, 0x1}, 0x7) ioctl$DRM_IOCTL_GET_MAP(r7, 0xc0286404, &(0x7f0000000200)={0x0, 0x72e5638d, 0x0, 0x4, &(0x7f0000ffc000/0x1000)=nil, 0x80}) ioctl$DRM_IOCTL_ADD_CTX(r7, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_DMA(r4, 0xc0406429, &(0x7f0000000600)={r8, 0x1, &(0x7f0000000500)=[0x1ff80], &(0x7f0000000540)=[0x9, 0xfffffffffffffff9], 0x77, 0x1, 0x3f, &(0x7f0000000580)=[0x40], &(0x7f00000005c0)=[0x3, 0x1, 0xfffffffffffffff8, 0x9, 0x4, 0x2994, 0x39c, 0x800000, 0x5, 0x100000001]}) fchdir(r0) 00:24:34 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) 00:24:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x4, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:34 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x0, 0x2}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x14, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:34 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x10001}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:34 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x19, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:34 executing program 1: r0 = socket(0x11, 0xe, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f00000000c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x40000, 0x0) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f0000000500)="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") ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x400, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e24, 0x1, @ipv4={[], [], @multicast1}, 0x2}}, 0x1e, 0x99, 0xdb02, 0x8, 0x8}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000340)={0xa30, 0x4, 0x7fff, 0x6, r5}, 0x10) ioctl$KDMKTONE(r4, 0x4b30, 0x3ff) setreuid(r1, r1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000200)={0x73f86d89e16ac900, 0x70, 0xffffffff, 0x0, 0x401, 0x80000001, 0x0, 0x7, 0x0, 0x2, 0x0, 0x6, 0xdf, 0x0, 0x0, 0xffffffffffffffff, 0xcbb9, 0x85a, 0xf855, 0x7, 0x8, 0x0, 0xe7, 0x6, 0x1ff, 0xffffffff, 0x5, 0xe023, 0x4, 0x1, 0x6, 0xb41, 0x3, 0x100000001, 0x9, 0x2, 0xfffffffffffffbff, 0x20, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000140), 0xe}, 0xa, 0x9, 0x8, 0x4, 0xb, 0x2000000000000, 0xcc5}) setreuid(0x0, 0x0) 00:24:34 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x10001}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:34 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = getpgid(0xffffffffffffffff) ptrace$setopts(0x4206, r1, 0xbb, 0x100012) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f00000004c0)={@broadcast, @remote, @local}, 0xc) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000300)="67660f3a400300baf80c66b85fbeb78066efbafc0cb0e3eeba200066edc30f350f20e06635200000000f22e0660f3830b3708f3e0f060f01712166b9800000c00f326635000100000f30", 0x4a}], 0x1, 0x10, &(0x7f00000004c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/mixer\x00', 0x40200, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000400)='tls\x00', 0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r2}) ioctl$DRM_IOCTL_AGP_RELEASE(r5, 0x6431) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000440)) r6 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x0, 0x40800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r6, 0x28, &(0x7f00000002c0)}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r2, 0x4008ae73, &(0x7f00000000c0)={0x3ff}) r7 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x40000) write$P9_RFSYNC(r6, &(0x7f0000000000)={0x7, 0x33, 0x1}, 0x7) ioctl$DRM_IOCTL_GET_MAP(r7, 0xc0286404, &(0x7f0000000200)={0x0, 0x72e5638d, 0x0, 0x4, &(0x7f0000ffc000/0x1000)=nil, 0x80}) ioctl$DRM_IOCTL_ADD_CTX(r7, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_DMA(r4, 0xc0406429, &(0x7f0000000600)={r8, 0x1, &(0x7f0000000500)=[0x1ff80], &(0x7f0000000540)=[0x9, 0xfffffffffffffff9], 0x77, 0x1, 0x3f, &(0x7f0000000580)=[0x40], &(0x7f00000005c0)=[0x3, 0x1, 0xfffffffffffffff8, 0x9, 0x4, 0x2994, 0x39c, 0x800000, 0x5, 0x100000001]}) fchdir(r0) 00:24:34 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00), 0x0, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}], 0x3, 0x0, &(0x7f0000003b00)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x1a, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:34 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req={0xffffffffffffff91, 0x1, 0x80000000, 0x1000}, 0x10) 00:24:35 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x10001}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x1c, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:35 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x1, 0x9, 0xfff, 0xb9, 0x7fff, 0x1], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x10001}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) [ 263.717959] device nr0 entered promiscuous mode 00:24:35 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200)=@sack_info={0x0, 0x81, 0x81}, &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000280)={r5, 0x200, 0x5, 0x3, 0x1f, 0x3, 0xffffffffffffffa8, 0x2, {r6, @in={{0x2, 0x4e23, @rand_addr=0x3}}, 0x9, 0xff, 0x0, 0x401, 0x7}}, &(0x7f0000000340)=0xb0) 00:24:35 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(r0) r1 = socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x12, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:35 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = getpgid(0xffffffffffffffff) ptrace$setopts(0x4206, r1, 0xbb, 0x100012) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f00000004c0)={@broadcast, @remote, @local}, 0xc) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000300)="67660f3a400300baf80c66b85fbeb78066efbafc0cb0e3eeba200066edc30f350f20e06635200000000f22e0660f3830b3708f3e0f060f01712166b9800000c00f326635000100000f30", 0x4a}], 0x1, 0x10, &(0x7f00000004c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/mixer\x00', 0x40200, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000400)='tls\x00', 0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r2}) ioctl$DRM_IOCTL_AGP_RELEASE(r5, 0x6431) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000440)) r6 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x0, 0x40800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r6, 0x28, &(0x7f00000002c0)}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r2, 0x4008ae73, &(0x7f00000000c0)={0x3ff}) r7 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x40000) write$P9_RFSYNC(r6, &(0x7f0000000000)={0x7, 0x33, 0x1}, 0x7) ioctl$DRM_IOCTL_GET_MAP(r7, 0xc0286404, &(0x7f0000000200)={0x0, 0x72e5638d, 0x0, 0x4, &(0x7f0000ffc000/0x1000)=nil, 0x80}) ioctl$DRM_IOCTL_ADD_CTX(r7, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_DMA(r4, 0xc0406429, &(0x7f0000000600)={r8, 0x1, &(0x7f0000000500)=[0x1ff80], &(0x7f0000000540)=[0x9, 0xfffffffffffffff9], 0x77, 0x1, 0x3f, &(0x7f0000000580)=[0x40], &(0x7f00000005c0)=[0x3, 0x1, 0xfffffffffffffff8, 0x9, 0x4, 0x2994, 0x39c, 0x800000, 0x5, 0x100000001]}) fchdir(r0) 00:24:35 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9, 0x7fff], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x10001}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:35 executing program 1: r0 = socket(0x10000000000000b, 0x5, 0x8002) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) 00:24:36 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00), 0x0, &(0x7f0000000e40)=""/63, 0x3f}, 0x7}], 0x3, 0x0, &(0x7f0000003b00)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:36 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x10001}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0xa, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:36 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffff9c, 0x10, &(0x7f00000000c0)={&(0x7f0000000000)=""/186, 0xba, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r3, 0x4) setreuid(0x0, 0x0) 00:24:36 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x1d, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:36 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x10001}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:36 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000)=0x1, 0x4) setreuid(0x0, 0x0) 00:24:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x13, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) [ 264.819492] device nr0 entered promiscuous mode 00:24:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = getpgid(0xffffffffffffffff) ptrace$setopts(0x4206, r1, 0xbb, 0x100012) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f00000004c0)={@broadcast, @remote, @local}, 0xc) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000300)="67660f3a400300baf80c66b85fbeb78066efbafc0cb0e3eeba200066edc30f350f20e06635200000000f22e0660f3830b3708f3e0f060f01712166b9800000c00f326635000100000f30", 0x4a}], 0x1, 0x10, &(0x7f00000004c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/mixer\x00', 0x40200, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000400)='tls\x00', 0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r2}) ioctl$DRM_IOCTL_AGP_RELEASE(r5, 0x6431) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000440)) r6 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x0, 0x40800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r6, 0x28, &(0x7f00000002c0)}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r2, 0x4008ae73, &(0x7f00000000c0)={0x3ff}) r7 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x40000) write$P9_RFSYNC(r6, &(0x7f0000000000)={0x7, 0x33, 0x1}, 0x7) ioctl$DRM_IOCTL_GET_MAP(r7, 0xc0286404, &(0x7f0000000200)={0x0, 0x72e5638d, 0x0, 0x4, &(0x7f0000ffc000/0x1000)=nil, 0x80}) ioctl$DRM_IOCTL_ADD_CTX(r7, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_DMA(r4, 0xc0406429, &(0x7f0000000600)={r8, 0x1, &(0x7f0000000500)=[0x1ff80], &(0x7f0000000540)=[0x9, 0xfffffffffffffff9], 0x77, 0x1, 0x3f, &(0x7f0000000580)=[0x40], &(0x7f00000005c0)=[0x3, 0x1, 0xfffffffffffffff8, 0x9, 0x4, 0x2994, 0x39c, 0x800000, 0x5, 0x100000001]}) fchdir(r0) 00:24:36 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0xb9], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x10001}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x1b, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:37 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}], 0x1, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}}, {{0x0, 0x0, &(0x7f0000000e00), 0x0, &(0x7f0000000e40)=""/63, 0x3f}}], 0x3, 0x0, &(0x7f0000003b00)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:37 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x100}) ioctl$DRM_IOCTL_AGP_BIND(r2, 0x40106436, &(0x7f00000000c0)={r3, 0x9}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setreuid(r1, r1) setreuid(0x0, 0x0) 00:24:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x7, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:37 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0xfff, 0x0, 0x7fff], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x10001}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:37 executing program 4: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200)=@sack_info={0x0, 0x81, 0x81}, &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000280)={r5, 0x200, 0x5, 0x3, 0x1f, 0x3, 0xffffffffffffffa8, 0x2, {r6, @in={{0x2, 0x4e23, @rand_addr=0x3}}, 0x9, 0xff, 0x0, 0x401, 0x7}}, &(0x7f0000000340)=0xb0) 00:24:37 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:37 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0x0, 0x0, 0x7fff], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x10001}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:37 executing program 4: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200)=@sack_info={0x0, 0x81, 0x81}, &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000280)={r5, 0x200, 0x5, 0x3, 0x1f, 0x3, 0xffffffffffffffa8, 0x2, {r6, @in={{0x2, 0x4e23, @rand_addr=0x3}}, 0x9, 0xff, 0x0, 0x401, 0x7}}, &(0x7f0000000340)=0xb0) 00:24:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x1e, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:37 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) r3 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x401, 0x0) r4 = accept(0xffffffffffffff9c, 0x0, &(0x7f0000000200)) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x80000, 0x0) r7 = syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x1000, 0x2040) r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x10000, 0x0) r9 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)=ANY=[@ANYBLOB="80000000", @ANYRES16=r1, @ANYBLOB="000326bd7000ffdbdf25010000000c00080001000000000000000c00040001000000ffffffff0c00070008000100", @ANYRES32=r2, @ANYBLOB="3c00070008020100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="080030f8", @ANYRES32=r9, @ANYBLOB="0c0002000100000000000000"], 0x80}, 0x1, 0x0, 0x0, 0x8000}, 0x40050) r10 = socket(0x11, 0x80003, 0x0) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r10, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000080)=0x4) setreuid(0x0, 0x0) setreuid(0x0, 0x0) 00:24:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x8, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:37 executing program 4: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200)=@sack_info={0x0, 0x81, 0x81}, &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000280)={r5, 0x200, 0x5, 0x3, 0x1f, 0x3, 0xffffffffffffffa8, 0x2, {r6, @in={{0x2, 0x4e23, @rand_addr=0x3}}, 0x9, 0xff, 0x0, 0x401, 0x7}}, &(0x7f0000000340)=0xb0) [ 265.758631] device nr0 entered promiscuous mode 00:24:37 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000e00), 0x0, &(0x7f0000000e40)=""/63, 0x3f}, 0x7}], 0x2, 0x0, &(0x7f0000003b00)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:37 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x9, 0x0, 0x0, 0x7fff], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x10001}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:37 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(r1, r1) 00:24:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x2000}, &(0x7f0000000100)=0x10) 00:24:37 executing program 4: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200)=@sack_info={0x0, 0x81, 0x81}, &(0x7f0000000240)=0xc) 00:24:37 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x3000}, &(0x7f0000000100)=0x10) 00:24:38 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x0, 0x0, 0x0, 0x7fff], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x10001}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:38 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) r3 = memfd_create(&(0x7f0000000000)='em0\x00', 0x7) ioctl$KVM_GET_DIRTY_LOG(r3, 0x4010ae42, &(0x7f0000000040)={0x10200, 0x0, &(0x7f0000ffa000/0x4000)=nil}) 00:24:38 executing program 4: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200)=@sack_info={0x0, 0x81, 0x81}, &(0x7f0000000240)=0xc) 00:24:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x5000}, &(0x7f0000000100)=0x10) 00:24:38 executing program 4: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 266.700657] device nr0 entered promiscuous mode 00:24:38 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000680)=""/37, 0x25}], 0x4, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000e00), 0x0, &(0x7f0000000e40)=""/63, 0x3f}}], 0x2, 0x0, &(0x7f0000003b00)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000, 0xff0f}, &(0x7f0000000100)=0x10) 00:24:38 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x1, 0x0, 0x0, 0x0, 0x7fff], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x10001}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:38 executing program 4: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) 00:24:38 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100"}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r2, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:38 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000000)=0x3f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) 00:24:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000, 0x8000000000000000}, &(0x7f0000000100)=0x10) 00:24:38 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x0, 0x0, 0x0, 0x0, 0x7fff], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x10001}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:39 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x800, 0x4) setreuid(r1, 0x0) setreuid(0x0, 0x0) 00:24:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000, 0x10000000000}, &(0x7f0000000100)=0x10) 00:24:39 executing program 4: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) 00:24:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000, 0x3f00000000000000}, &(0x7f0000000100)=0x10) 00:24:39 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{0x0, 0x0, &(0x7f0000000e00), 0x0, &(0x7f0000000e40)=""/63, 0x3f}, 0x7}], 0x1, 0x0, &(0x7f0000003b00)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:39 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x0, 0x0, 0x0, 0x0, 0x7fff], 0x0, 0x9, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x10001}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000, 0xff0f000000000000}, &(0x7f0000000100)=0x10) 00:24:39 executing program 4: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)) r2 = add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r2, r3) setreuid(r1, 0x0) 00:24:39 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) prctl$getreaper(0x19, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getuid() r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x90201, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000640)={0x10000001, 0x7, 0x3a}) setreuid(r1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000500)={'raw\x00', 0xaf, "dbb3d0e13f5cb1e4c45e65083d1a72b87efc12c780c067df533aceecb2deae320278114ffe823871f7575a5bb60a4bf8b2d019b36cc957a2f440b88d50420bb869cb8cc381681e7571591ddcecb86c08d0f88fbf32813c6f5345fe016029bf1901453edb3f2db140c3bb90871f4452889f2d1aedc283431fece0c3d855ff2a827d34191195a54a3517a2eedd52dd660355bab94799234d499177ded1bc78dbbd3674b591b888f00d3ef742accf717c"}, &(0x7f0000000480)=0xd3) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x75b, 0x5, &(0x7f00000003c0)=[{&(0x7f00000000c0)="7a49f73c46db728925acc2137984b070eb422648ec2c190e2b7252dda6fb3574ae102d57eb7a429458d8bd50e32dd488de4f4ea73439ec04bab1b582eab8f704729d8d02139c941c5ad50bc716ec968a6eb6e07c29b57f76168ce9ec37eda4a3579f05c2aa36e859edd65652330e5725284bbf66d94a50efecc1dcc380bff71dab7bfb19b33b5107587c86a5eb49c2d74d", 0x91}, {&(0x7f0000000240)="390413400f0151b92fe7dac57784022d6e9eaa1f715203160418a50d2c7d3a3c71056524e357ab0dca8bd3f98b0b7218a2bbb000b2586e9d0b85ef31877df966ab6a305769fb43a0a54daa0482dbc5b379f774571819f6785119b93266959c6f979efce78d612e89780b1568241157f7", 0x70, 0xfffffffffffffffa}, {&(0x7f0000000180)="e821fd2f4e696d7903f5249808f77f7b3add699da20c16b1cb252e62c3d2ece3", 0x20, 0x9}, {&(0x7f00000002c0)="1192b36fef993bf8b8d40682309e606531618287f975a6f7ae5f1e15da97c1d3060d063ae818e6b6b21970a02429fc8df678af1d8532a9c6602cc5f17275d7", 0x3f, 0x10001}, {&(0x7f0000000300)="03f657cc263cbb5e4f90bcf18736adce262e8e7382b0362dc92152d7d5ecb8b135ff47ae9f80b36cf14a2ddaa800a7de789d2c331bf50d157f6366138acb272046b877f77228ebd17598f210f891d361c3fc29f99420749fa9c3800487d13afbb55d567255c1dee7030799bc580aa83938a74c8f49fce8c0007e44af4dbf8fe437d7d7968dd28f83fb19fbe4f83a3706c0", 0x91, 0x4}], 0x40, &(0x7f0000000440)=ANY=[@ANYBLOB="6669686573747265616d732c7379737667726f7570732c66696c65730b0065616d732c726f6f74636f6e746578743d516f6f742c737ff6ce09b73ed9ca3d2c20"]) setreuid(0x0, 0x0) 00:24:39 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r1, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000, 0x3f000000}, &(0x7f0000000100)=0x10) [ 268.420830] XFS (loop1): unknown mount option [fihestreams]. 00:24:39 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x0, 0x0, 0x0, 0x0, 0x7fff], 0x0, 0x0, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x10001}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:39 executing program 4: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)) r2 = add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r2, r3) setreuid(r1, 0x0) [ 268.496462] XFS (loop1): unknown mount option [fihestreams]. [ 268.525408] device nr0 entered promiscuous mode 00:24:40 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000, 0xff0f0000}, &(0x7f0000000100)=0x10) [ 268.574073] device nr0 entered promiscuous mode 00:24:40 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x0, 0x0, 0x0, 0x0, 0x7fff], 0x0, 0x0, 0x8}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x10001}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:40 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{0x0, 0x0, &(0x7f0000000e00), 0x0, &(0x7f0000000e40)=""/63, 0x3f}}], 0x1, 0x0, &(0x7f0000003b00)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:40 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000080)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4001ff) setreuid(r1, 0x0) setreuid(0x0, 0x0) 00:24:40 executing program 4: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)) r2 = add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r2, r3) setreuid(r1, 0x0) 00:24:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000, 0x3f00}, &(0x7f0000000100)=0x10) 00:24:40 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x0, 0x0, 0x0, 0x0, 0x7fff]}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3, 0x4], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x10001}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x200000d0) 00:24:40 executing program 4: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) 00:24:40 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x0, 0x0, 0x0, 0x0, 0x7fff]}, {0x0, [0x7, 0x8, 0x1000, 0x80, 0x3], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x10001}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:40 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) [ 269.486091] device nr0 entered promiscuous mode 00:24:40 executing program 4: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) 00:24:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x806d) 00:24:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x4, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) [ 269.581673] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:24:41 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{0x0, 0x0, &(0x7f0000000e00), 0x0, &(0x7f0000000e40)=""/63, 0x3f}}], 0x1, 0x0, &(0x7f0000003b00)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:41 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x0, 0x0, 0x0, 0x0, 0x7fff]}, {0x0, [0x7, 0x8, 0x1000, 0x80], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x10001}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:41 executing program 1: r0 = socket(0x11, 0x80003, 0x100) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) 00:24:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1, 0x80000) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000080)) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)=0x0) r3 = getpgid(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000026c0)={0x0, 0x0}, &(0x7f0000002700)=0xc) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000002e40)=0x0) fstat(r0, &(0x7f0000002e80)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000002f40)=[0xee00, 0x0, 0xee01, 0xee01]) sendmsg$netlink(r1, &(0x7f0000002fc0)={&(0x7f0000000140)=@proc={0x10, 0x0, 0x25dfdbfb, 0x2900}, 0xc, &(0x7f0000002e00)=[{&(0x7f0000000200)={0x24b4, 0x23, 0x810, 0x70bd27, 0x25dfdbfd, "", [@generic="cb0fd2040a0902f74d09879261dc1b74786f9ad5e91aef737ffdadb107ac9d36e2a8434fa8525d750686b4b4b5baae0a55f7ea8805de15dfb45f4bbada4e962de0c49c29f82f8315634e4bde8644bfa944e690cffa0da1c9dbc7578947b54ff23afd69d035b4205291106ce497928078733b29cf8469e1697933a4773838254e711e23ec139c4272db79b25aec301807c6e0885ce77b0d3d0edbc895c6371538461a642905604bb0dc95cd17cec8fe6a0576b54700edd307e5f4ee4e4a584b1d075513790039cb8500af0c82fdf95753b043673069c1bb3877b852b81fe44dc0809b593543a19934fa69c97192ba8107674e341bb24b730ed59bbdf4a7b6691533cd9d405977cfa685104e664b44ccbb82b31733ea57c3b267e7575d585086fafcd6c967a242e7a8f14b736a62eacd90e6bafd59a30b3234c9e96a9546217911f4c44584225061a38a4917928315adab6b1f2b58e9739b2384041d4c33dbfd34e48cc23b02b1304079759133cb071539f7b5b06f10bc94750a044b67f63a22f2248a8378fdf64bd400c2b4e781f91ebc983f130bad4e8e08e0c9644c3eeac07956b049029c5e40786009db84d751c96599478b9019d46c86aa470a99fe36d5ff176790df68bb06ccc0cba1571ae254f040e70310d6f22fc36b41db2d62bb6e6cadc5726d90e00fd197663218e2a6455d3f6f691728d9b252e90765510ab4fbe5bc07bedc22325cdd8083ae29a6373e79b52d875f10cfdfdacf41074cc8319f14c06e8a9322d2a09be6838440b6b55be465b50b4e6fa45a64e163b95a8e512991212e08b81957cadae1ef97ea9e9faa6c1e219b93caa171215e94baa1474b3d79bb3d243562ec6be92c0b967e294f4f75a37f62ab56f225b03e262798df683ef8e13a0559c26d319afbbfb80022a54577ea0e12895713d600334b7d8e361827ff8035690b3b3164f2562ca7eb90fd94055fe780440f3d281b3fb793223a264404630318c1443927fd97162ba12c7eaf483a413614484a247fff6542d98f4031c50f64d416ad18640a3c1d9cc75d7ac3344c362159e99e1e1ead5ffbf94ff8de8b77a3986e7874898fe7b61f331a091f015c714ebecaf53941d26fd2f881f15546cfc9a78798db54df8adbc4044620845058279ef355de0a1854383ca4250476dc7fbfeb4eef09d854ceaad54b15105990df5649bb038c65a0759ee33fa007b4dd39bb62f40b9947f632adfb06e61306c02dd2710e8d259fd3d18469efcfaf4a4b4b6de604ee3d9a16fcb1918983adf924b3de94a864f5a1fb846554ff219bb7393c2f9335dab9b660494bde01a4e4c3921fac8d537fd654e8f67479dbc78e327891212382f5407ea191d0eb5e294f603bba1473287dd8ae3102e27e22dc4f71d3d3beb9340b941e2542b44cc4d3aefcca05236f82653b2045d4a16adab21ef31ae59638bdb829167e2888e4d34a195e78d30334b242e4fb33d6f1501d6aef093768ec50b779d0c2f90c73c6ecdbd6e2952ed3d97d7ac89ec021660926c0b48c3215ca952fd464b0a17e87501e4b6a61b54be8d71428a25bc15c33fce00010f515989e326ced5f6ae62424c78a76df806a0bc01b72c3ea74173839f9c4378528c62fb76693e02ec1865656c41fa52a93af0157bc56a949a27b7ab50c1fdbac3f1b53bb96adff2fcf82ea1c4ff29ecb07d55bd7c35dd74bda15f504ed254ce15d7ecf43e2ef40eac081f48df2a22b1603d6f8f4cd79741af0bcc7b869cbc767474175bf6d3595af73aaf0bbe3a0c821c65ce2e6471148e1945270c04283dcfaad7dff6e2eaab3c92e77727c8dfad74723530265da48fbe0455536bbaa1ffa8e1ec17bebc478eb6ae2924a02927c9c193743789e0099019e4fc15e4f4d562c0d9bf1f902ea8695dfd3dbdebd2e66a184e9d96836247ecdf3825d017a80a0172af6d959e4574f88b13142787c6716e920125186e75cfc6127a13c55f61d497bcb265034b248b44d18c9fff2fd3e3fe4bcd580eecdaabb72eb4616be93fae9231b06136feca6ab5f829d71264f01212f353d1f719d76993a64d04521ce5bf0fa53a94191bdcccef71e410cc2f10bd33853a28a5141526f15dfbd91055d7dc25175624f43dff8bbb70f30ed6e5942ec78c08cfb1f0968d22a36abf80f45ba043b7f5b038b751b22caff42de9d4ec1e767a08ccc298dc2ad8108b225ebeb57548909c0b57425e8d0887981d6262219d46f5ac9d8d5ee1442519a9ce575c9246fcc0dec0b0232d30b2e1fc39275ab13210429d7a11469854fc2b624a77c4898e185959fce70a1f4dca8e472aae6e64dcbb975a2cadc8d969a3483e50734c99ad105f2577a3ed79ed6cc2420aeb01ce3f81f5d6154230d30c27cecd8eb65fb23fff371eeea4b83fd7f20228dc59e0fb2465485d152fb4600ce4eba44faa522300132254ad6bda40964f9a54bf469e958d1d07bbeb402ac308fb86b367a46bcb54358611ad141b8d5339ed76514e7c97d22ece52464a70035a2055a8aaba27a781e99b8dce0b6b6b76801fab996145f3859d04354b6db4fd3f26da51437e38a740ec9c41f5c100b7d02984289a6b2de8e826b8ddfb8a9429f5cea7935498f8fede03cb79b3f984223a9f2c4458ca0586aec909369cff14a431becc3713452b82eef1bb2a6d61043143819f02e972309436f28a9e8a1334be9efbded3aa9659105475ad7361db5a10682041715300ac74536eb3d36d0193e71a0741ce57ffdfe731005bb4f5a570d94c6a14fc8b7a99462c583dd4b57216f02cb72a3808e3f1fafc9704b5e2a365395888080fdbc770c3819224477d1bd19a06b8b9ae2a1eb8733d49df6cbf2674a607da8826a287784fb9aff2de1089fec74471ee5ed24a7e2b3a13df3f894504dac9424a3ccb1fba39ca853d6d74d7e2d50f1cdd23fdb656f5032ad7a85e673a71eca11afb2d729ee5dad616b4f709e627b92e256d38e0430a1dff7cddc2397a2fd566b1b66a4a2d27c66a1c9b2bb4801144ee09dbc55d25b5da66ceb96f5440d6c0e1a2fa10f83149f9590a87fcf64d2f19540cb1519827b5ecc79e85e5cc61b1b72683ec460cb7f6674a123b00c0bc9e4571da0fc8af92e361244d7483902ec4a9fc038ae5b2b101f7839dd5d63c3dc5c567cc6f745ff4175e85a22abbbf9154caaafe44e67748dea693f13153bb8cdedca0b6588318511de3e0c79bfb5a95cf06d8fac4892bdce7f5332ff4aee00980ddd6a816ed0249b83ef0bee182d8c9c6c946aabaa8c33592808260f45f4da501bfa4f689d71d32ba5cecd9dad95f28791499618c6a9c4be4120ad6c2f8792a337d6364729f893de32b60e7b3d902973951a6a476abb5881528dc41c328423cd4403b1f6c7091e1bf0151f7da96871006916489a34d1b40ab52ee9c1a2714517ffd9b42f66859af722685aaf058fdbe1d589d8ca72c8f811fec95959a1089e667806eb9e8853efb960a22b3d63494e2f73d61c622d9de3641bc7a5aea6398346073762326d011459003b2adfb36da7d7157647aa5d1a4f43b09d9142c3df06e2050997ea8eb3f97ad444417530cbddbf50f2e1219692f9cb48c97b434ad8f41afc658a752c459131df850f8159a2fc945eaf2c33381764876007cc56463a9c8e67de38eb3aeaabe223995385397b4770d99c7a4d24157e0c45c713456f6aae93f31de478b9b130f892de17785e97d2f321df59a070a17d8f7832e4f084dc7d9dbbb4ff576b129d0c239081bdb182d1cf6169a67da7c2acbac344ecf6cb2796c2f136e888759940053c62a86fa7151863e2118866068f74f8a484d4a920a3f25774b7e0ab5876f899f0f597367c39ab9cbde42151422b266c20016bddf8ab4a627e5374d9b7fff8400a88b33ba4eb46ef5521660441f015b4ef90e3aaaf1840986d55415dc4e096ad0f2a86ef9f8afb22546d485b4a59335fee7668f1813c95c1176d93ddac90c12fdd8da1c47c4cc43ebabc9e39d15756b0a919626ce51d7e58ebda7624783858da6fbb2a77123f4fe93817c38652ae78954b62ac68c0f249353ae402027eaa265d4b5141d2fa18c69f0083ca2d0b7780b04bc5de61675f2fe0d08c61c871953c017e8420fd1d1179e932255fa9e39f6bc614499fc6b18bd3edcab1d144ee7bed528991e2998bbdaf280b884fae323a578126eaced8f739b94f3a1859b25f9a6ea6aeb300113a49168871deff4a66b1f84a27b512c9baa006f09f6edbe85a614616813f7e15466aabb479c7eda8aa6c0aae6ef44955ace90346c80950cd89dce8381d493fe9398bf91522451fb325bdf19476688328f83ef07328400bd0af3a1293011ab4cb3bd06c089833d0c17b8ff4ddf6823c48feff93cb761def0b3ae5b156ebd4f916d98cf593ce3385d43ec77b097700fded56192254f2d001513a4c294dda8cd8dd339db199281b06989578766f26c7948baaef32c3048bf8f6739ca85f365a46370463f48d90fdc099dfd61d9d084ada6637baa0e1c86b1199948f818e6068cfd942f8fcac8945fef6596d8832199dd751043a50a345f00108606332ea603d632d6fca2cdb2f93b9c953dc29e7d893a384eeb7e7d23c70366b5c04bd1bdba872c34b8c70685946eb82ab071c0a5a6e364a3ddc2c9dea61506342eb7246101763f16bc54ce558516f575dfdd48cbcf1f3608c2ce26ecc02f1782a1e56e28a0d9fff61a3daad584a924efcd5a632946df8ad778533ea5c0d0d88c174cffe65aabee03344eee9eddc2131fc5099a1e7cf7fa82e192563e9109049b4d4758a33fef09c78513b77c23a2c4cab6dab18c3437e5a1ac85fc807bbf9b22856a753fcc88b10d86f2eed80a2c4ca4dc94d527898c62c5582bce068062138d137b08c5832c2eda686a3d8f98cf164480c25cdf10dd18fcc8b2e36918c477da080cad4845b6fd269cad951260f1e0c7fe1137eaf3e9fca8c9eaafd68905b2a5f90dea76bf990c19667a01af79c1a1a0ac8cbd2657a6f234f1f793b192a8adafe9859a59c3c07c107ec0438263910829d996c9830dff05a2b241586feb104cef1cba4833fbc022daaa3b4544ccb4d582922697e989cd659a067947a1c3333ecaf42ec287113823e182339acb24ab5b8f5cb223ef2afff6aca378bb7f23eaaab0de489b6eb27b8b834282e47a909c3b607a669ebf3b627e9da69c564b7ce0bdb86be01ac32780fb92a87d1f7fcd87d74411d339ed6381189106c3ba40a6faeffafff20392771afa0b84a168b13edda60004d40288d56201906c8db96a9fade2bb07159ff5ac9eb052d7d2556529724ddf516eff19b19e61ac19c8ededc1f0591a9284149d8f576a32e812c3bfa282a3b007c2ee7f24660c77b364969850836afa98c572b3b3454b11c4ccb03801820e34787cb7342738e0cfc57904a29274271e5cf83cdd5930c5f245800451ab77b57ab1ab37c16e341f1e49175f1c58336aa5de73e44270a6022e611d0edc008b6def4cb4d4796a75ebf1b44c1240e02adf8a46711325655a06a30161de309629507a8e17146a8de8745e51796fb4a9a81edd55d89f3f892b6888db5171dae491c07b12df0961a2b25873f5d722d040a603ee8111b9848941944ceff5529812ba0aa5049a00708a61adebaddadff9ba4378f3476d773267ef3996b413f9ed0d54789995b8a1d43d92306ce8c462c124b494d339d6aecb92729be89ef890f80a0ea535bf67bbae29f22cb25eb6194411b61fc72b009871ab433064e1f0f42f5776d7fbcce5948390cc4203d4a825d90c895c163125b4fceb245f8d7d6", @typed={0x8, 0x77, @u32=0x1f}, @nested={0x180, 0x15, [@generic="a6a4d85985ac6d8de09d407228baa4bf962eb041604ce9174ae3b5774e70e9849e6965ac207de75e1e844a9111ff421146b0cb8f459d1b950d3086d34d65b102ab0c31e8996be3c697f2ab103edc2190cfec56f021303351e136cb4a9e5562aa9c693daa790a2477bac355090a4f0d4747ffe37c5ab6", @typed={0xc, 0x1f, @u64=0x2}, @typed={0x30, 0x58, @binary="4e67cd0330a5f66cdcb1ce479a08bc9552924d8d9f8342048fc08b6a663b4125cab03a2ac593947e2e"}, @generic="7c2fa32b9240da163b7675821c7b6249b3d896dd3acd39cf2ab5b83dd3a31df115ceb3122412f19d62a1d5f5b4a58bd85203f669b5cc079465b585d65fd8ddea9342262982178c1a2b0a4f9200b1e3561770b4", @generic="200ea2ee3276c48f47ccca54f6d913484bfc0d63cc02382e2b3c42c2b35d12aa66bd3c6aa60ea18f6a1a15ded4d51ea5d524908ab7d21065dca186c97b95449cf0c35e8b3067fd4150934f83032cf0f1d268c00ef03c07bf2b9697e5ec0a085c85826c9e182625b267bc1a3da5", @typed={0x8, 0x33, @pid=r2}]}, @generic="e470f1894d309cbf915a5ee0d6f4831a4e544088e462fb383022e7bbd9d2ab00cd884d65cda89c85ff84d53e0f7f397fee15c01fd9f0e3f48338494670fab8c43b1219baacb0d82126ff14d0d4387b0ec8868e845c3c787b33118c352ae07de48fb3213f02d828423fbd1d927356f61e743526c0b334d3664d25c64b4e3d777bbf4c6bf4fd24935f9e8a6898ddbc3f1ee5e3a9e3434b1526138d039e34", @nested={0x1108, 0x2a, [@generic="65a30a813d66f3c4ed4263e1636849ea4934b7a4a479f9602eb5ea4d6563a43f22391cf5766fcb1910043eb4784df3429a5ba13332b4aa263b1fbc36790781698a746e08a5ff53fd36ab704478bc5c4eeb14b4417497b4d3cdda8306ccf5b2225476e7eeded181ab07e4355e6e78e1212a4a36c715b34e9f3576542e01519bdabf51f8844cb524454210bbd6b2ec9347", @generic="8cdaf0c7554097cd68cae380b2f9a99578e3de1a437275f9e24e3aec504d7c9ed769", @generic="623f52a4d78137c9641f83b78001279443e1ca6c3f64836488cecd9e1c8ab2f364c65a07b0030979b806266479eef04268e65746", @typed={0x14, 0xe, @ipv6=@mcast1}, @generic="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", @typed={0x8, 0x7b, @pid=r3}]}, @typed={0x8, 0x3d, @pid=r4}, @nested={0x16c, 0x25, [@typed={0x10, 0x19, @str='/dev/midi#\x00'}, @generic="a54872b22843f053cc5d8f24b25470aaf94d9fe84c8d6cf2f1e24be755bbdf9e022c486d2d7d3673a8b0bf60a5a839af9282e3b0b0b13d2038fc0fe261c402051eacdf0e3a678d22a7cfadacaa1ed6", @generic="7430807834ac3839bc9b4e1f5c91bac5e229085a3f33082a822066a5ef66d9205bf3", @generic="dd5e61bd221ee7fc8ae1059312046531dd43df84f817861e3ef2efc31e7f4309efa9183f20efa5cd28a4344ce2c2fd9509efafc49139eb517b380f719f26268b2d4f8bb009bc95e216104ead425389cf6acf66793e1345e7d532672e84f885d67c0a3956f3200980b24aa44e8bd2166de385dad6ce515f68bed3e35bfbbc616119bdcbfbfc760ea0956440db79c278395a59745a283c5f58d6856c1e7f4d5ad445237073596f573bd9ab800179a6694ca6aa539316ea8e88ff968099476dd8bb1755cb56dcf6161b2074a9fb6cd1b032ffd7aad2d45c52a822af8a0b4c1c820490fb6d05"]}]}, 0x24b4}, {&(0x7f0000002740)={0x6b4, 0x3e, 0x200, 0x70bd27, 0x25dfdbff, "", [@nested={0x348, 0x22, [@generic="0009208cbbe450e04e02041fa49d141ad821536a85f522087fce354d3d083110a91eb99f50c674860cd1a8a5dd7ba70c19b52602134dd3455160ee75f04f6538f3e3f66fa3813137db59147b3869ab2439dfabb0113e4c064e92b5debe71903ce68abcc2df0380adae33b0241042c984f0eeb5f240de7cf11a5345d1b9238a0b54e54de1a0a03b7c68ffcca3c8f7cb", @generic, @typed={0x8, 0xd, @fd=r0}, @generic="d28226aadb4ca5f4975db8b7d3b225191e6bfc7210a52b7e998ad012946cd2dad0e299f02b297fc387ecfafddfe5a2afb3f26ab9db1a5caa6ac85da24e6a213d338f0dd6d0ee8b92b8021f5b6aa925e6d52c48f2f5b933", @generic="fcc291bfde71e3632488f0a6d6800cb003c257ef6a40b1bb5dacf3e160c2b0c60624c34af3281288e08d2cc5cfb42aec0bad142aa5412a97ed4c88ff30215af0043797418a35220f65361c785666b806dedbca70c02bd556db4c02e2ee59f94011051a6e3f373e45dd8d541dd1ff6518d41cb060545a65cdc5b2881bc0cd9ed87d4cb4761567b2ec4bfb308d4083543f974df132fcaa7b0bd80fef2bec862595aeb9d945", @generic="a1ef182c22a5a2403c1d1bac1058394f5859a3b414a29815a1de6a027800b0eb34d9e0f7eb7cf9d0f9f28ee677c8ce963143b2adf6247c39968d8f6220c11b722b2cc512507485e7ca203428ba89a18a8d6452fa4161e402103ef906eaab9e8c3e79ee9c484d4931622dfc58115826debb1e3cdebcfcb27623cc233601ead61161ed5d849db4351f036f29d34d563f45958c70889aca7e63db5e673212b4441e299bc434e77e193f7e7f97cd9bf8702337575b4c3cdf5f30cbcb4b625971ca4c6111c09de231f15e19e5af1a3546608aa8cbd2af5d9d9f34b355dc4dc10a7313051d8b260f27927643b6f9f3c090ca8eb40098cf76dfa172", @typed={0x8, 0x81, @fd=r0}, @generic="ce1764fe7f58a7a8b22d65327137581efa8face9f6e3f512375c2361c3d64839b120338668ef66dd75b75ce906cf3fa2b21519f1ccad1b78d2e4ee2a5f2448dc5e845a1cc5d93b2087e9f1767c6abb2d45c95edd125c23b0383f9f9f36f942bac712ab2c04c90a89b18a94c7c7e7d30174c1692bec290877ac4a655e7f849f7020ac09d8b19dc87c1bc977e0481efd7da5be94f58a89cf536b5d5e132c838183", @generic="58f88971661b917e672d52bd3c411056ac"]}, @generic="48c0480222bceb10348d223acc992286aa0e04a1fea5e1b8653da8fa0d5e59e86a36f7977f11c78c3f606a07f202340a0051a68b563082837b7b4d3b7df6b3d9f3ea1c1125dc97a751a4fa577355fb357c37b13c30810086aba6e886a435bd9d8535074b3632d6502c3aabef00435cb0bac4c078e32f61aec685659649ee1bdcb1d8a6449d6c5a0fd7efa448159b47b9f488c210dbb084b9f79538cad318be7a2a39b40b9719bca7d948f2d9b71661b47c53ec5442374b9a2025c98aacddeffee36aa97610c197e0c58f5a3931fa825a4c2a5a40", @nested={0x208, 0x61, [@typed={0x10, 0x1d, @str='/dev/midi#\x00'}, @generic="141733a5659ebff82e93bf7d3db3bcf685c8ea55b8daccb15eb5ea399a22afd3eb97f3849f04fed5330fdc57c42424a2aa84730793a25534c4e4288f11f6504da3ee75dbbe9262fe75a2eaa7937cbb37205da6c5858d096f6f00021248e933ee1aea314f3758f0840d62729c0753c83ea15d463cd5946e21e0196c5ac01dcd04bf666857e564e8d66689a508886cf9735661ce46ebcf", @typed={0x10, 0x20, @str='/dev/midi#\x00'}, @generic="4aa71c233edf233fbea2cd6ef43c31684ec9e916214b25870ffa36492bc0662d589fe67dce71dba168f4dbd09a0b73ecd9774e171880844c405950f39b43cd739bc7927ce0013993dba94b05df15fb2d311985a0ad239579b25b9e92a3304451de33a39657215d2ee710aa8b7abac54f724504d5b93be85ad12969b886010e7975ea7fa1b4846029aba2c60ed8dc62443de9fd848274a42f89619dd5c26b269f3d7f73ea74314289e6230681d91cf65ad23ad2bee57ff9d9b3b8eb7444a887783744edbb5c2dac421268f5f60fc263ab79515915db9541f095d6d3ed", @typed={0x8, 0x7e, @uid=r5}, @generic="ef6576b062a6ea0f0f7b6f2d7e57b274d1420022f82020b2fcf61dd9ed70bbf95bcdf9bbe530c8391516236a2ab8691a8bf96b17a8f6cc6f959e6b07c9459c35a4d619541e9d154d57f51e2c4bc638ac515b7d79c7470ab2d7a23f0e77f5a519", @typed={0x8, 0x67, @fd=r0}]}, @typed={0x80, 0x22, @binary="2eb7511e5b7e05eacbbd53fefaa620c1c8c0ec2f37183bc7873c20535b0e245cd546a784e47922ebfa4139954aef84e5d4c09132288d9f7d73d83d9ca1a4b2562b92f98c6168cc576cd91a5e4ff4575e419d96f0509cbf71facbed783f76166775e2fa0c93dd3011119e191117e5dc3517c8e1a7b5e74b7e502e48eb"}]}, 0x6b4}], 0x2, &(0x7f0000002f80)=[@cred={0x20, 0x1, 0x2, r6, r7, r8}], 0x20, 0x20000001}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:41 executing program 4: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) 00:24:41 executing program 3: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) 00:24:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) memfd_create(&(0x7f0000000140)=')selinux\x00', 0x6) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f00000001c0)="1a4b3014518d8d63a22b6d329d82998cac7fdec4a69e085169748e1a0c237cf1d1221e2c0783d9feb5bbdf54400594b3237e01584cd85816814aee29250000f7110000000000", 0xfffffffffffffee3, 0x40000cb, 0x0, 0xfffffffffffffd2d) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:41 executing program 4: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) 00:24:41 executing program 3: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) 00:24:41 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x0, 0x0, 0x0, 0x0, 0x7fff]}, {0x0, [0x7, 0x8, 0x1000, 0x80], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x10001}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:41 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0x31, "9bb94bbb5c0677fb081564b503d4a04131bf66fa2a2644a05e9d1b8c1bc86b7a28fcec3e86ae1f9bb27af2e2fd3b9d4afd"}, &(0x7f0000000040)=0x39) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000080)={r1, 0x8001}, 0x8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setreuid(r2, 0x0) setreuid(0x0, 0x0) 00:24:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) r2 = fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000700)=0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000003a80)='/proc/self/net/pfkey\x00', 0x40, 0x0) ioctl$VHOST_SET_MEM_TABLE(r4, 0x4008af03, &(0x7f0000003c40)={0x3, 0x0, [{0x2, 0x71, &(0x7f0000003ac0)=""/113}, {0x4000, 0x52, &(0x7f0000003b40)=""/82}, {0x2, 0x75, &(0x7f0000003bc0)=""/117}]}) r5 = fcntl$getown(r0, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003580)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000003540)='\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000035c0)={{{@in6=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f00000036c0)=0xe8) lstat(&(0x7f0000003700)='./file0\x00', &(0x7f0000003740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair(0x11, 0x6, 0x5, &(0x7f0000003a00)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x89e2, &(0x7f0000003a40)={r7}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003800)={0x0, 0xffffffffffffff9c, 0x0, 0x13, &(0x7f00000037c0)='md5sum,selfselinux\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000003840)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000003940)=0xe8) r13 = getgid() sendmsg$netlink(r1, &(0x7f00000039c0)={&(0x7f00000000c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x100202}, 0xc, &(0x7f00000034c0)=[{&(0x7f0000000140)={0x294, 0xfffffffffffffff7, 0x100, 0x70bd25, 0x25dfdbfc, "", [@typed={0x8, 0x53, @ipv4=@multicast2}, @nested={0x70, 0x25, [@typed={0x8, 0x91, @ipv4=@broadcast}, @typed={0x4, 0x4f}, @generic="6704af537409b45ee87f1a125fa4b53fcb1b9c604a57b8364bdf0f4f9b9b5b438815fec7d02e083aec1dbbe329672e41c2f51eadf8cdc2d6eb8e737c8a6900680762e4f86d74c6c681c782a8f5c2f2ec5b6d69c0a85c62", @typed={0x8, 0x3f, @pid=r2}]}, @nested={0x1c, 0x86, [@typed={0x8, 0x94, @u32=0x6804}, @typed={0x8, 0x24, @u32=0x2}, @typed={0x8, 0x1b, @u32=0x3}]}, @typed={0x8, 0x6a, @str='\x00'}, @typed={0x8, 0x6a, @fd=r0}, @typed={0x4, 0x63}, @generic="456180ccb80a0be87991ba18ec36c575a87b335f2f9cc1ec8c9fe76d36dce0dc93f58a36eec64ed226cadd5f8fa0d3c9a3ec22677f3a565bd71ae4a085997d73e2a70bf98e4cc89fbd4553bc2a76930b332c72bf703d3cbf68486347943afab26866dc0bdbb44d385c27f4b1dc8d763f24ae96", @generic="38d1d9d091015d6f6358b9a88a308f37079f0306690abd0da7ff4b6dbde5503b7947c25e5d9e355f8493029092103861822878b08e651d138498911e3cf4a6c62883c44cbb03486a93c1391630f5647eaf4c95f4eeedff758332fac286782e04a1f7bce52038e65084b989e487a2ccb8d350540519341e9c2d55db14365dfdd047c737a781b255263bdd5c5fc3c8b03f10289d9238172de0bd5b7aae628f27d00e674a9e4ff2f7089bd310070e7306cb0d59fed9060f547eeacd80376f534efffb0aa639b226542028fd6ffff5acf7d544eae8be2a22afab615228fbcf8ae15b8d587e23c167866cb5720fad234a619dd889", @generic="21cfa3fe625f4990dae8b89b681ca16c636f55a4d5fee90264ad3e47b928cdd54cba2ab3501249c349df21d0d001ee0dc171c1bdfa7355221bcdd0568ba667139d6950fbe5dd5a48c95c1871d1c4130cd2ed32124b69bf2776e1c4820cac2b7afcc53e8841ba07d907e1f2f22bd7fff556f462597ba06e"]}, 0x294}, {&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x2cc}, {&(0x7f0000000740)={0x15e8, 0x36, 0x0, 0x70bd28, 0x25dfdbfe, "", [@typed={0xd4, 0x52, @binary="ff24bf4c9dcfe88f7638804212bebc0e9fd22a3b9ed2ee6064c0ea60cc49807c433bfbeafd143edc06824fe8b66f65c7e8c3f1f862b9ae16c1b86711a778a0d3a99a57544d439e91dd79564f4ab080f8271fdc5c3240461d0b6fa284eedbfd7089b87458c99ec5373b4e62d141658d3259edf65408654b8b0986682bad96a105b343a0e8d8d1a06d51ccf10a7735730079d531149e0d20424fd627c755d8d31d90ba3e2b0f8e737f0438c4f5c8569c9e6c9d9ed57da22a41fb3da3c883bb6cc9e83275435ac7082a1f2b5491be47"}, @generic="a8e0677fd023a21e3c939a79b062d7bdbd0d1543d5e881772612accd34e68cfcd8d1c799d72a88c67d4db8ea95b25cb8d8e7e901ada5fbb612baac6546396ff3ac47c08b4ea7a4c01b", @nested={0x1158, 0x7d, [@generic="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", @typed={0x8, 0x34, @ipv4=@multicast1}, @typed={0x8, 0x82, @pid=r3}, @generic="e0e6625fac111b57acc0dfb1221f7ad2e67f8d9b210acf139bb146ce5e05421ab57cc51c8262a120d7aeaac03908ee71fa6681cb9c626d22c40fd39e34ed4311779eb37bf2c59629b4c5d674be9f2d3dfddf33bf3051e40eb34e9b6322a986bf545322bb90e74c7fb9dbad628c7f3522fe3f35c2894e812bd84f83e6dca728100c18f2f23bfb93f5b6b11ea1ffd8fe453f29da99ca0d26dc52282f85938a7512881aa6776d1e59170ccdd4684820a34e69818d49cad33b323af3f37941b203146b4d8c", @typed={0x78, 0x6e, @binary="f6b216f9cf86b98a04b3241d33ddbacaae44f45b922c5df5e78f1ab85a7d1ecde67eb54a3e46fc1fe2686109d4b7671c9d0c3ea9fa84e0b70b254a324eec7d72c658c81bcfaf1d6e230f46644f6061b6cda58fdc821f87a5d8ff898c9742ce9c695d08f469f672abdd55f7346930048767"}, @generic="0ad94203573effc2"]}, @typed={0x4, 0x5}, @nested={0x1c8, 0x47, [@generic="b8364a5462588f38659226a393bd4c650fc7d988e0a5103716229f1121945c2e1100fa5ac30adfafe3b0a41d5f65caa75347b05d4c3046255552d29dedaefcb4970f49ce4da3dbb6bfa1481fdd66d39f4d26a786f6c58b9a3c68a62fbf8c71056db15893cce36feb8c3c7c24192d7adb78fbf7f112d4f335", @generic="415d79afe43d66992d3c1a41257897eb306b06cfe80670cdaddd69f2dbdcf2006629992e8677583ec1d552ca3a784cad7914baefb7d570f8bbddbe6ab5144a38271adb43c7f9d17467669ccbeb672da35cae37af5e885c73", @generic="d9273cf3f6b8d79e29754a6e35d16b660bd87a2abd323c1d8e6b5a09c7b320e3e9752447b13000d0ff7fa809bb91b744fcf67f06d1", @generic="41e68c54e89023c15dd1521a0febc0161fee86e67683491aaeffa8118920dcbdf6c951d60fcef8f8f823c05b4e5798512b60d0070c86d10ad074625231055c1dffe0c34a5ee5316f", @generic="13f46bdb6d4d1f1f070154e98245c1bd3ba7dcf248dbf2314600db7aa98a97fb99546e1755280dd02eac169311adf17bc6f433db2787d6c18f8ec8b3d0a5b63700b291a8d82529ff133da1152589962945738eb0f36c6ab8b14b313a1704cd4ee49a3a010365e15e7d4b8a6c3668dbacc66031f6a094"]}, @generic="f5919b4456969aab21feefda94a54618772b173e54a60dbaa841f71d9a4958b3d03fa523ce27758668662cc0fd46768053f9010d605c3c7c0fccffafed6da2b7501fe117a6b2c42495aea73acfe6bf8bdd7428658ffa3bb0230354b688cacbdbddaaed791f36676c89912bb600fa2090d5d11d02595fee8ffc7344fca2885b820d2e624eb6efc5f9d1583c7496b7170d9fc13ec1a7b1f49cb7882828d35de7f98fe2faf9b95ce35c4cc8714e", @nested={0x10, 0x7d, [@typed={0x8, 0xd, @str="d92600"}, @typed={0x4, 0x42}]}, @nested={0xd8, 0x4e, [@typed={0xc, 0x58, @u64=0x3}, @typed={0x8, 0x7c, @u32=0x4}, @typed={0x70, 0x69, @binary="eea70408beaba585d23465da32acdc6acf2e85dc8c05bfc29a1613c65494091930980e21d2da25a311a19674a6916f5d477423007d211c78d3b76f3b30b76bc275a674a32aa74376e63f161fb7bcac030ddf678044e55799584332489eaa028dcbed3269faa17e2cd33901ad"}, @typed={0x4, 0x5f}, @typed={0x8, 0x7f, @str='em1\x00'}, @generic="7c4a911714c4735e4435f5971eeba17d5a220b009ec3839c93facc0387779e471659435d7dd9fda8f8626d6d7d29866718c8c302fa99bddf7d19ca96f74e05ff42cd83"]}]}, 0x15e8}, {&(0x7f0000001d40)={0x1254, 0x33, 0x2, 0x70bd27, 0x25dfdbfe, "", [@generic="01a5ad677bf7142b201cecbec19f41fe2a5e3a20098f89af0d896c026f0c51e8b59b38e4e5337b4661c32e8e035193a1d0e11784652be8c2ae54b4dc7a1da043750c9cd1c547905cc3ecc7afbd963dac2b0e5e018087fdd65002f9a8671f476e3b07a59aca3b12439334a8bbfb13439db90165701f79fcdf71ba5d5fdc", @generic="86967361173cc784860a41526cdf20c720c88bcb86ad0098db56e244031562b4fab66bbfab31b11e02e137f5dc191109598b45c526716419ade974c6291396ceabef07dc2d2712e23521086a521cde60cef7ffa8df8662395898d4179c163e6ca8c6093c4ba7879d50908f6aacba06139326ce8f349599d0ac09062f51f36ae6992fd41425d1a383910a34f67c6f0946da4d6d1eb6f2e40756c0", @typed={0x8, 0x33, @pid=r5}, @generic="dba60e9535187d19bcc2526151c09f9a1e89b6ea22f17110ffdd9f386a47881c7d3be49e13ea3fb8f2bf21ab6d0704dc59c028467834c2c67d5f65d92cbf605808d40eee7343c551404f0d47a96e67549865e37123958d6b2fe21412f2380ff269f62f41a9a7684d87bb4e691afab0d2c2ca2794eb2046ace7fe81b70717879ab0c68a08299ee013032218f0352298f4a2e026f170dad02a1cbfcaa84cf6871fc8b6de830015eaa95a5afa4be4e26a1962a4b6", @generic="bdae6200e165229c8e881d1494e50b68c24d80c8f219b5645502c9f1f0fcaab1126f0d8fb7a4d04acd8acbe4ee36ea20a7725b3c2be6e00ee4319e75d177b35776f486cfbba70a515a9db29633d91f962f180d44d38e3f37f786ca293f630b88d87cfa7461bca74251ea521086", @nested={0x1004, 0x87, [@generic="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"]}]}, 0x1254}, {&(0x7f0000002fc0)={0x16c, 0x1c, 0x1, 0x70bd29, 0x25dfdbfc, "", [@typed={0xc, 0x29, @str=':&.&@\x00'}, @generic="e45966bcf97607561549afae716e41fc6724f3f6858ae5b473ff664962aac7bdd3b6cbb9e95761204e5576a2f4e685261e94bbcb4bd523bb050724cadd36d6969746d2d2ba270e3891849f2b6144c9a73e787fdff4e3dd2a315a7cd96d1de3acb5f942175083fab822d9a372b49be8ed101517b9eaf0bba0d0cd1df96409bf3d07732d2c4a78add006e31d7d9c9085081d707a257420007056528b05883d525248db7b56189a5f45e1b9485b6ac6966d67712a1d4bf8d55e16fc17714efc0e3ebf7977984f3e5ca2a5ba59ec951b6b36867c3535d245bd0aa68a5d42429c262085", @nested={0x6c, 0x1b, [@generic="62cbe83220d3d92e9dd6833af8b8f17013c28a3f2b0d12cfe7ab951fe54d6f8a8ad38947a0a1869b066c6accd25a33d178ebc39f70d722702c0bc4a40777937b5b2ef39e3f4e8cfdfc25abdf35e2912564de0ccae368a9d3c3ffaf10c4e73a2e7e5e8302ec0a"]}]}, 0x16c}, {&(0x7f0000003140)={0x354, 0x1c, 0x200, 0x70bd2c, 0x25dfdbfb, "", [@typed={0x14, 0x13, @ipv6=@ipv4={[], [], @broadcast}}, @typed={0x1c, 0x31, @str='uservboxnet0vboxnet0:\x00'}, @nested={0xc, 0x60, [@typed={0x8, 0x8d, @fd=r0}]}, @nested={0x1f0, 0x5b, [@typed={0xa8, 0x5, @binary="6c482ff9458252783c01c5d62d2dc74e1b9416e99149480d403782c43b24e8e0b7aa69681918f91503b3caf1b47020c914adfe064c07d6a6d5a6538d29315eb891ebdee5404ad91829a2ddc8a57ffe8b7d69c2d7c8cca7a284b233e9478e37d5fb0b0b9d9dc60e06664317c1308fbfd69dbfd02cf7b60251e51d9492fffba81f01d7bb03b9e04d60caa951c52612588424418600268b943e389ef573383e91c9cbc91e88"}, @typed={0x7c, 0x19, @binary="bc4ee6f8a58e182228e9c6a93ed1ce981fb7ffc92863e3962df7b2ed506aa3de123d6cf662fc24b6eb2c58fc8705d467e0c6ac49a8246c3d3db314a2a8e34aef067ed587dc1e4f2da1aeb7aed74f439e4ab98a1c30c545484c6c506f5598dd4d8c59594410fe6c4234dcd292f32791d00d589b8a16bd94"}, @typed={0x6c, 0x7d, @binary="c0c7dae33e8d1a1673091d7cb9f95e1c66f5d981a32071051a880cd6859c254fff53500f5d95d2ee88b8dadf16cefa9abc283b4f611ce6ff2657ed4234235241329287d2d39854c370eaa21e73d25bfdbe45b86174dd0744960910d03323ff60673986ebeb00"}, @typed={0x5c, 0x50, @binary="498b66b7a1500785a0095724df395653f2122dbc1eff8f683498058c65aa8ec6d2bb44fff0459816d16de2d8452b9b122ebdc6a332222af4d8992f9f867038a24b032de08d60bfef58ac98c9bba20f440bcdab1076"}]}, @generic="1f3cb15f9b6eda306e1b7461847f4b853f1ac4a63dcb5d1634166f911cace446181e4e26f49bef008b1ef1c6dc95293f0c882431c0e5112eec3c2deb", @generic="19f64e8df6980f751d06342c0311a06ace7ef2fe2105333e54a3ce46f5d49f9acdae368829086d7ef899d262d6d1d4b35ee607a664e98eb1a5ba85976f5d1e82eb93122b15dafcaa9baba0cce89b078e629e123f3ce608fbc492c0381ab2ad972433422fecb5eb3f4c79d0c5042ac317c0eba647ec887a376c1e1533093b5484f1cd2f412c20ea44f3f0b821332262165098c357db29257abbbe88bd96e40ed92b15cd1602d91ce79ecb0e0a266ddc73f01aeaf1b4c3c8f739c8d6976b182b553328973d629584c19729264b2405d8b84f74d948281cea54d3"]}, 0x354}], 0x6, &(0x7f0000003980)=[@cred={0x20, 0x1, 0x2, r6, r8, r9}, @cred={0x20, 0x1, 0x2, r11, r12, r13}], 0x40, 0x10}, 0x1) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000077000/0x4000)=nil, 0x3000}, &(0x7f0000000100)=0xffffffffffffffeb) [ 270.437428] device nr0 entered promiscuous mode 00:24:42 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{0x0, 0x0, &(0x7f0000000e00), 0x0, &(0x7f0000000e40)=""/63, 0x3f}}], 0x1, 0x0, &(0x7f0000003b00)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) accept$alg(r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="0200000039d8b0664c3d72518d866c77068a24d8d903039648329c31a73efe185faed1d9939e3ef17cdf2fd591"], &(0x7f0000000100)=0xa) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) write$cgroup_type(r3, &(0x7f0000001900)="746808066164656400", 0x9) 00:24:42 executing program 4: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) 00:24:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=""/138) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:42 executing program 3: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) 00:24:42 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) setreuid(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x65, "e71177b09bb2a941fa4442dd34d602680f81ef6e772e75e5015747923e94971531068131c85375d629f937fd7909033b7f569dca78df6eacda940b635c22d5a3063b731dd72f6e24a32094897feacc8d7523f0d1c5e939a5c06c252150b0027b1fa3f561b1"}, &(0x7f0000000080)=0x6d) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000000c0)={r3, 0x1}, &(0x7f0000000100)=0x8) 00:24:42 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x0, 0x0, 0x0, 0x0, 0x7fff]}, {0x0, [0x7, 0x8, 0x1000, 0x80], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x10001}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000077000/0x4000)=nil, 0x4000, 0x0, 0x21011, r0, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000040)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) 00:24:42 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x1) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000001840)={0x0, 0x0, 0x4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x9}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001900)=@mangle={'mangle\x00', 0x1f, 0x6, 0x558, 0x0, 0x428, 0x0, 0x308, 0x308, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000001880), {[{{@uncond, 0x0, 0xc8, 0xf8, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x7f, 0x4}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0x9, @empty, 0x4e23}}}, {{@ip={@multicast2, @remote, 0xffffffff, 0xffffff00, 'vcan0\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x6f, 0x1, 0x23}, 0x0, 0xe8, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0xfff, 0x4, @loopback, 0x4e21}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1000, [0x0, 0x0, 0x0, 0x0, 0x7fff]}, {0x0, [0x7, 0x8, 0x1000], 0x0, 0x4, 0x8}}}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00', {}, {}, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xbe, [0x7, 0x400]}, {0x0, [0x0, 0x0, 0x10001], 0x0, 0x10001}}}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b8) r1 = getuid() lsetxattr$security_capability(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)='security.capability\x00', &(0x7f0000001f80)=@v3={0x3000000, [{0x100000000, 0xffffffffffffff0d}, {0x7, 0x15c}], r1}, 0x18, 0x2) setfsuid(r1) fsetxattr$security_ima(r0, &(0x7f0000001fc0)='security.ima\x00', &(0x7f0000002000)=@v2={0x7, 0x1, 0xd, 0x0, 0xb6, "902e4bc9d20e17b0ae944c3911735a072dedbdee01449efd437f6d2a76ff79673551fb1e105ae88ebb5036d324168afc895291a3f8bc7cb40e545cc57aeb6c2b31fb6608944411ef4327a9e2344f73dc66de214f02fd36f29ecfa4eecd7ad4764025844e5b7fc868c1e3554e31c1c75426eb4eb9b3407799ca0f509edac0b11853537835430402079ff3b0575335caf55697d7e61f68b7a7dee2c8f61f93a59563c6eb18732c537bc84b8bc58bb98c4b492aa57a167d"}, 0xc0, 0x1) lsetxattr$security_capability(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)='security.capability\x00', &(0x7f0000002240)=@v3={0x3000000, [{0x3ff, 0x1}, {0xd3b8, 0x401}], r1}, 0x18, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000002280)={0x1, 0x4800000000000000, 0x4a, {0x0, 0x1c9c380}, 0x7, 0x9}) fcntl$setownex(r0, 0xf, &(0x7f00000023c0)) execve(&(0x7f0000002400)='./file0\x00', &(0x7f0000002580)=[&(0x7f0000002440)='cpusetkeyringvboxnet1\x00', &(0x7f0000002480)='SET\x00', &(0x7f00000024c0)='\x00', &(0x7f0000002500)='\x00', &(0x7f0000002540)='/dev/null\x00'], &(0x7f0000002740)=[&(0x7f00000025c0)='TPROXY\x00', &(0x7f0000002600)='-\x00', &(0x7f0000002640)='/dev/null\x00', &(0x7f0000002680)='[@.mime_typevmnet0systembdev\x00', &(0x7f00000026c0)='L,\x00', &(0x7f0000002700)='\x00']) ptrace$getenv(0x4201, 0x0, 0x8, &(0x7f0000002780)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000027c0)=0x8, 0x4) getsockopt(r0, 0x9, 0xd68, &(0x7f0000002840)=""/245, &(0x7f0000002940)=0xf5) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 00:24:42 executing program 3: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)) add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) setreuid(r1, 0x0) 00:24:42 executing program 4: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setreuid(r1, 0x0) 00:24:42 executing program 1: r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x100, 0x100) ioctl$UI_SET_KEYBIT(r3, 0x40045565, 0xd8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0xb5, "9f300ad1dc8d29bc95593b0004fc8f38a265e3763d8d1ec9bd28c057166f2817d6212604c4031d00b9d360e0cbe3247949f5125f23904d941e9692cbd2b55e484ca447c30f9fe0bf72768e20151d2296bd20959874a4814b4f8d9e3f12efc8f73cc3de6e2f163242f5f7ee37c03250e9907419882217d9db3bc9ee62f86fb5e4dbd598ca376d41be9b887aa3b5bc25b779f69c0ef5a7fe89dee2aa3e602ee520c8e480f8eb1b21470f50ff3cc2c3a06dd153f06d86"}, &(0x7f0000000240)=0xbd) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000280)={0x2, 0x1, 0x8, 0x5, r4}, &(0x7f00000002c0)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setreuid(r1, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) setreuid(r1, r1) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r3, 0x28, 0x2, &(0x7f00000000c0)=0x9, 0x8) [ 271.383845] device nr0 entered promiscuous mode 00:24:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000074000/0x4000)=nil, 0x4000, 0x2000001, 0x21011, r0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2, 0x0) mknodat(r1, &(0x7f0000000080)='./file0\x00', 0x1, 0x8) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0xffffffffffffff64) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40), 0xfffffffffffffee3, 0x40000cb, 0x0, 0xffffffffffffff61) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000077000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) [ 271.475356] kasan: CONFIG_KASAN_INLINE enabled [ 271.480045] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 271.487425] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 271.487905] kobject: 'loop1' (000000009c51ef52): kobject_uevent_env [ 271.493708] CPU: 0 PID: 11427 Comm: syz-executor5 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 271.493720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.493759] RIP: 0010:__handle_mm_fault+0x2f94/0x5a40 [ 271.493778] Code: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 a5 22 00 00 49 8b 9f 30 fe ff ff 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 <80> 3c 02 00 0f 85 76 22 00 00 48 8b 1b 31 ff 48 83 e3 9f 48 89 de [ 271.493788] RSP: 0018:ffff88018374ef40 EFLAGS: 00010246 [ 271.493804] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 271.493813] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff88018374f078 [ 271.493823] RBP: ffff88018374f270 R08: ffffed00306e9dd6 R09: ffffed00306e9dd5 [ 271.493833] R10: ffffed00306e9dd5 R11: 0000000000000003 R12: 000ffffffffff000 [ 271.493844] R13: 0000000000000000 R14: ffff88018374f028 R15: ffff88018374f248 [ 271.493858] FS: 00007fec79c8c700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 271.493872] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 271.502111] kobject: 'loop1' (000000009c51ef52): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 271.508814] CR2: 0000000020074000 CR3: 00000001d8380000 CR4: 00000000001406f0 [ 271.508827] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 271.508835] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 271.508840] Call Trace: [ 271.508864] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 271.636403] ? kasan_check_read+0x11/0x20 [ 271.640554] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 271.645812] ? rcu_softirq_qs+0x20/0x20 [ 271.649831] ? unwind_dump+0x190/0x190 [ 271.653718] ? trace_hardirqs_on+0xbd/0x310 [ 271.658020] ? __kernel_text_address+0xd/0x40 [ 271.662498] ? mem_cgroup_charge_skmem+0x216/0x410 [ 271.667423] ? trace_hardirqs_off_caller+0x300/0x300 [ 271.672523] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 271.677628] ? __save_stack_trace+0x8d/0xf0 [ 271.681948] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 271.687481] ? check_preemption_disabled+0x48/0x200 [ 271.692489] ? handle_mm_fault+0x42a/0xc70 [ 271.696710] ? lock_downgrade+0x900/0x900 [ 271.700849] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 271.705764] ? unregister_trace_event+0x3c0/0x470 [ 271.710621] ? inet_sendmsg+0x19c/0x690 [ 271.714582] ? __do_page_fault+0x567/0xd10 [ 271.718812] ? trace_hardirqs_off_caller+0x300/0x300 [ 271.723908] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 271.729464] ? check_preemption_disabled+0x48/0x200 [ 271.734500] handle_mm_fault+0x54f/0xc70 [ 271.738544] ? __handle_mm_fault+0x5a40/0x5a40 [ 271.743107] ? find_vma+0x34/0x190 [ 271.746637] __do_page_fault+0x567/0xd10 [ 271.750683] ? trace_hardirqs_on+0xbd/0x310 [ 271.754991] do_page_fault+0xed/0x7d1 [ 271.758787] ? vmalloc_sync_all+0x30/0x30 [ 271.762931] ? error_entry+0x76/0xd0 [ 271.766640] ? trace_hardirqs_off_caller+0xbb/0x300 [ 271.771646] ? trace_hardirqs_on_caller+0xc0/0x310 [ 271.776557] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.781386] ? trace_hardirqs_on_caller+0x310/0x310 [ 271.786383] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 271.791819] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 271.797341] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.802167] page_fault+0x1e/0x30 [ 271.805635] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 [ 271.811521] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 1f 00 c3 0f 1f 80 00 00 00 00 0f 1f 00 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 1f 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 83 [ 271.830405] RSP: 0018:ffff88018374f5b0 EFLAGS: 00010202 [ 271.835752] RAX: 0000000000000000 RBX: 0000000000007a50 RCX: 0000000000004b40 [ 271.843010] RDX: 0000000000007a50 RSI: 0000000020074000 RDI: ffff880182ffaf10 [ 271.850266] RBP: ffff88018374f5e8 R08: ffffed00305fff4a R09: ffffed00305fff4a [ 271.857524] R10: ffffed00305fff49 R11: ffff880182fffa4f R12: 0000000020078b40 [ 271.864780] R13: 00000000200710f0 R14: ffff880182ff8000 R15: 00007ffffffff000 [ 271.872045] ? copyin+0xe4/0x100 [ 271.875397] _copy_from_iter_full+0x263/0xc20 [ 271.879877] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 271.884878] ? tcp_rate_check_app_limited+0x121/0x460 [ 271.890054] ? iov_iter_advance+0x1370/0x1370 [ 271.894534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.900092] ? __sk_mem_schedule+0xac/0xe0 [ 271.904324] tcp_sendmsg_locked+0x159e/0x3fa0 [ 271.908802] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 271.913981] ? tcp_sendpage+0x60/0x60 [ 271.917785] ? __fget+0x4d1/0x740 [ 271.921237] ? ksys_dup3+0x680/0x680 [ 271.924934] ? lock_acquire+0x1ed/0x520 [ 271.928887] ? tcp_sendmsg+0x21/0x50 [ 271.932591] ? trace_hardirqs_on+0xbd/0x310 [ 271.936907] ? lock_release+0xa10/0xa10 [ 271.940860] ? lock_sock_nested+0xe2/0x120 [ 271.945079] ? trace_hardirqs_off_caller+0x300/0x300 [ 271.950206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.955763] ? check_preemption_disabled+0x48/0x200 [ 271.960779] ? lock_sock_nested+0x9a/0x120 [ 271.965005] ? lock_sock_nested+0x9a/0x120 [ 271.969272] ? __local_bh_enable_ip+0x160/0x260 [ 271.973935] tcp_sendmsg+0x2f/0x50 [ 271.977465] inet_sendmsg+0x19c/0x690 [ 271.981271] ? ipip_gro_receive+0x100/0x100 [ 271.985617] ? apparmor_socket_sendmsg+0x29/0x30 [ 271.990361] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.995912] ? security_socket_sendmsg+0x94/0xc0 [ 272.000650] ? ipip_gro_receive+0x100/0x100 [ 272.004964] sock_sendmsg+0xd5/0x120 [ 272.008672] __sys_sendto+0x3d7/0x670 [ 272.012478] ? __ia32_sys_getpeername+0xb0/0xb0 [ 272.017129] ? lock_release+0xa10/0xa10 [ 272.021087] ? perf_trace_sched_process_exec+0x860/0x860 [ 272.026519] ? posix_ktime_get_ts+0x15/0x20 [ 272.030825] ? trace_hardirqs_off_caller+0x300/0x300 [ 272.035914] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 272.041429] ? put_timespec64+0x10f/0x1b0 [ 272.045558] ? nsecs_to_jiffies+0x30/0x30 [ 272.049692] ? trace_hardirqs_on+0xbd/0x310 [ 272.053998] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.059531] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.064903] ? trace_hardirqs_off_caller+0x300/0x300 [ 272.069984] __x64_sys_sendto+0xe1/0x1a0 [ 272.074040] do_syscall_64+0x1b9/0x820 [ 272.077908] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 272.083253] ? syscall_return_slowpath+0x5e0/0x5e0 [ 272.088161] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.093028] ? trace_hardirqs_on_caller+0x310/0x310 [ 272.098024] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 272.103023] ? prepare_exit_to_usermode+0x291/0x3b0 [ 272.108023] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.112871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.118055] RIP: 0033:0x457519 [ 272.121227] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.140112] RSP: 002b:00007fec79c8bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 272.147802] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000457519 [ 272.155049] RDX: fffffffffffffee3 RSI: 0000000020000b40 RDI: 0000000000000003 [ 272.162296] RBP: 000000000072bf00 R08: 0000000000000000 R09: ffffffffffffff61 [ 272.169541] R10: 00000000040000cb R11: 0000000000000246 R12: 00007fec79c8c6d4 [ 272.176817] R13: 00000000004c38c8 R14: 00000000004d5760 R15: 00000000ffffffff [ 272.184066] Modules linked in: [ 272.187970] ---[ end trace 64a4e400e9ec5ee8 ]--- [ 272.192744] RIP: 0010:__handle_mm_fault+0x2f94/0x5a40 [ 272.197919] Code: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 a5 22 00 00 49 8b 9f 30 fe ff ff 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 <80> 3c 02 00 0f 85 76 22 00 00 48 8b 1b 31 ff 48 83 e3 9f 48 89 de [ 272.216973] RSP: 0018:ffff88018374ef40 EFLAGS: 00010246 [ 272.222362] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 272.229682] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff88018374f078 [ 272.236969] RBP: ffff88018374f270 R08: ffffed00306e9dd6 R09: ffffed00306e9dd5 [ 272.244295] R10: ffffed00306e9dd5 R11: 0000000000000003 R12: 000ffffffffff000 [ 272.251614] R13: 0000000000000000 R14: ffff88018374f028 R15: ffff88018374f248 [ 272.258881] FS: 00007fec79c8c700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 272.267164] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 272.273089] CR2: 0000000020074000 CR3: 00000001d8380000 CR4: 00000000001406f0 [ 272.280403] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 272.287686] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 272.295003] Kernel panic - not syncing: Fatal exception [ 272.301345] Kernel Offset: disabled [ 272.304978] Rebooting in 86400 seconds..