fff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:33:39 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:39 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:39 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x5, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 1296.046323] audit: type=1326 audit(2000000019.831:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6974 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 03:33:40 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:40 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:40 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:33:40 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:40 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:40 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000500)=0x1ff) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4c757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8240a140badd5c0150738039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a7def717d082626c6c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b3240") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480), &(0x7f00000004c0)=0x4) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r1 = dup(0xffffffffffffffff) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) connect$vsock_stream(r0, &(0x7f0000000200), 0x36) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f0000000440)='y\x00', 0x2, 0x3) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000005c0)={0x0, 0x78, &(0x7f0000000540)=[@in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e22, 0x2b3b, @remote, 0x1f800000000000}, @in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e24, 0x1, @empty, 0x1}, @in={0x2, 0x4e22, @rand_addr=0x80}]}, &(0x7f0000000600)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000640)={r2, 0x80}, 0x8) 03:33:41 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:41 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:41 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:33:41 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:41 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:41 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000280), &(0x7f00000004c0)=0x4) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) write$P9_RWRITE(r0, &(0x7f0000000780)={0xb, 0x77, 0x1, 0xfffffffffffffd57}, 0xb) clock_gettime(0x5, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r2 = dup(0xffffffffffffffff) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000900)={&(0x7f00000007c0), 0xc, &(0x7f00000008c0)={&(0x7f0000000840)={0x64, r4, 0x71b, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x20}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4800}, 0x10) syz_kvm_setup_cpu$x86(r0, r0, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, &(0x7f0000000440)="660f38f6142e0fc7b50b006766c7442400050000006766c744240230cc00006766c744240600000000670f011c240f225d0f01cf0f35660fae3c0f221b66b9800000c00f326635000100000f30baf80c66b8da47ff8366efbafc0cb00cee", 0x5e}], 0x1, 0x11, &(0x7f0000000200)=[@efer={0x2, 0x1}, @flags={0x3, 0x40}], 0x2) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f0000000740)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x10001000}, 0xc, &(0x7f0000000700)={&(0x7f0000000580)={0x14c, r5, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xffffffff}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x200}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x89}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x15}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3800000000000}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3f}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0xc080}, 0x4000000) ioctl$FICLONE(r1, 0x40049409, r0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:41 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:42 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:42 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:33:42 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:42 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:42 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="32047cc8ae66805fa2e93e4192c1ee99fa949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4c757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8240a140badd5c0150738039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a7def717d082626c6c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc4e9635751b4e0690c3942dfcbc8423f3fa253142e12b3ffd681e838e64d5d40a35729b7b324000") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180)={{}, 0x400000000000000}, 0x18) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:42 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:43 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:43 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:33:43 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:43 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:33:43 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:33:43 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:33:43 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000200)=0x0) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) mq_timedsend(r0, &(0x7f0000000440)="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", 0xfb, 0x9, &(0x7f0000000580)={r2, r3+30000000}) sched_getparam(r1, &(0x7f0000000280)) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000040)=0xfffffffffffffffb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpgrp(r1) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:43 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:43 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:43 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:43 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:44 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:33:44 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:44 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:44 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:44 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:44 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180)={{}, 0x0, 0x3}, 0x18) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:44 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:44 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:33:45 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:45 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:45 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:45 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000040)={0x9, 0x7, 0xfffffffffffffffc, 0x4, '\x00', 0x800}) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:45 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:45 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:33:45 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:46 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:46 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:46 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:46 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) fcntl$lock(r2, 0x6, &(0x7f0000000280)={0x2, 0x3, 0x4cc, 0x8, r3}) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f0000000040)={0x40, {0x9, 0x9, 0x6, 0x0, 0x0, 0x1}}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000580)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x58, r4, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'tunl0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipddp0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x28}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 03:33:46 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:33:46 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:46 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:47 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:47 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:47 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:33:47 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x6, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:47 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:47 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:48 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:48 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:48 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:48 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:33:48 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:48 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0xfffffffffffffffc, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:48 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:48 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:48 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:48 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:48 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:49 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:49 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:49 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:49 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:49 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:33:49 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:49 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) prctl$setmm(0x23, 0x7, &(0x7f0000ff9000/0x4000)=nil) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) [ 1305.755457] audit: type=1326 audit(2000000029.541:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7245 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 03:33:49 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:49 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:50 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:50 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:33:50 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") [ 1306.601897] audit: type=1326 audit(2000000030.387:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7266 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 03:33:50 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000200)=0xc) waitid(0x2, r1, 0x0, 0x9, &(0x7f0000000440)) 03:33:50 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:50 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:50 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:51 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:33:51 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") [ 1307.482800] audit: type=1326 audit(2000000031.268:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7286 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 03:33:51 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4c757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8240a140badd5c0150738039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a7def717d082626c6c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b3240") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r0 = dup(0xffffffffffffffff) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000440)=""/199) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") socket$inet_dccp(0x2, 0x6, 0x0) 03:33:51 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:51 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:51 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:52 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:33:52 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:52 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:52 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000440)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r1 = dup(0xffffffffffffffff) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f0000000280)={{0xff, @local, 0x4e24, 0x2, 'ovf\x00', 0x10, 0x6, 0x1a}, {@rand_addr=0x4, 0x4e24, 0x3, 0x7, 0x0, 0x9}}, 0x44) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000040)=0x7) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000200)=0x3, 0x4) syz_execute_func(&(0x7f0000000640)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000300)={{0x3, 0x2, 0xfdf, 0x3, 0x5}, 0x8001, 0x401}) sendmsg$kcm(r2, &(0x7f0000000c40)={&(0x7f0000000380)=@in6={0xa, 0x4e24, 0xcd, @mcast1, 0xfaf}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000400)="52ad7fd686a696dabd9596123d6632145c49597131e60e", 0x17}, {&(0x7f0000000540)="00808a18f86582f604aec75707e541bf07ab6acdc5c91fba2496476665aa9c264693cd087bcf47309a04cc69507302b7be3d8b4143a23f1402b015b8344af6f0074dc09ccb0a602dccc3b4a8cf026630dda59b39a0ba292a268b6333a1c428bd993604a4048f5ff0da0ca3e9d68cefd2b204f171ef8f66980c071a96e6e2b304ccc5024ddf4e5cb0f3c5fcaa0f62c6f3f8972ceb99d2da9ea67af8a8e9dc401a96352a5d89c755322bd42cb5820fbc9843b4837ed384954f7938cca2a806", 0xbe}], 0x2, &(0x7f00000006c0)=[{0x90, 0x107, 0x20, "f7ef8542da800520e818ce8ff14db0edcb2a656dbd806af77dadc31e217514de9f7221cd938f7e5f7994236f25135aa9eeed8a95492cfa70e3de7ee10132ab4084352c267472b97919d50bf9955da0dab1e0a024fe2ad0d783a01927645d68f579a63a24ef24f30b71fe4b7b1dcec88d5a93bbcb22c4f96369"}, {0xa0, 0x10f, 0x0, "45ad653ba51040695eca8ada24cd2c25720f4ee47168545f929b930f984732f3e36761ef53ebf33a47937a922c365223d7e9905a30e550ed2a0e446bcd5405a8201052d10425133b46eeff51d8458887d69fb96c7198013b4fc8df8449c69f6466d02dca6cf353ed0567761ff9a73bd12b6b2c0bbb6d20ffd64decb94c33906cb0f56f38ac7c7688008d22c7"}, {0xd8, 0x13f, 0x4, "3d39c960f89c402ae0725f6b317436acf753817766cf93400a3a5eb6e0adc89517abb76e8a60a7669f497b77cddea611fd4129216e4641beb84bec44fc68b16939efdb8aa831a419f03e69c800743c833b4e4eec167a923c45b9f0d5d222b4a88522f0a5f93254d855acc38f4fdc3ec634d0c292e882b3f1c7a369ea6c67474e9f8992858e9bf2ef91ca727ab8ceb90a2fc1daa36550adc22b98fbf4205443ae494a38cfb77895c517fe930a459d853821ff4bb98ef1d1b3813d1f94b8cee23ead1edcf6747f28"}, {0x110, 0x10c, 0x5, "788579ba4e6aa3f3c6c107d60fdd2a7af43a2824eb192b6092033813d60407e18952b87e4f816fba0ca563fda82785ebc6801a5e20f9bc4fafa478f8408998d40857cfff8a5625077f139d3397e7f745688f9736fbe4a217d65ab397828355cfe10dab17110fc3d1d3a0167e201b051f09edc76bfbef4b61a6d0197c3549189e3563544847299b9c969e0288e976891a23ae6f1b80a6f8f1b6dadc60fbe57c5d9772ac86ef252dc5bc332ba49081877f4a6afce8075b3b2c0b9daf6380ca072200802ab784b96bc97231e39adf1536af84d5fbfe938a43b8342ae37711ee1cd008dc0604f17b71f92f361c883ba2a697fb335eb5731a367e19bde32fd5212c"}, {0x48, 0x0, 0x8, "8fe43b484b355f3e93881ec0ec414e0a54b515f3c94a24bdf587665f760ef115f1ec341e63c32f1625f5200c84f8a27f0cdda98911e46e73"}, {0x28, 0x11d, 0x5, "11fa7bd861b38ca1969eefbdf634497f918785ec5ebc"}, {0x70, 0x114, 0xb46, "a3bb9a59dfa87dc0b8410c4c93f5a81b9241d0e1d68e79c451332417fa2c2d1156d8ffc44de487537c0ef60933fc1f22806ea526d6eb13e7032c1490bd0dc47a93084ee137e7978bcc0f38aaf883379385c1738b6b2e491af4"}, {0xf8, 0x117, 0x8, "28d25c08dcf9e40e1c9972fdd2c2117825c6897225ffb699c597a2f3f982ff374654c7a5f2c56c647969db67bdc64738260cfe2282a74f961d70cc375b0dd14515898203025ff417053f8e006d2c84109a047aa350aa35480cf96d082e561dd70cd3081384f779bbe9fc501571aeaefe56ab23bd2c726257f3221b92c70dcedf0fe9d027ea13ebde9d7b51e72c47ef0041e383b73c208f6eb100e198e4ad73589d2da2117cf4eb25bf63e3f67319a9611838cd5da40af5bb7a94e1135c2f02d04bc973f6ac1d5883c5021aaea8fe4fa40a8fd38fac2aa11bf4658b0f05db21ba8e2abd5de0ab1340"}, {0x70, 0x113, 0x6, "6d25b7ca1388569d7388df875a7aaac1c4917417f5e4cf69a4662352fc84c569fa0a65e35b9836bd216dee42b871167c634e85fb9b15232e14a07f7225640c10fad09756eeecf9b34564a6cda37453189bd2e6271a9d3f704c6112918bb0df"}], 0x560, 0x4}, 0x800) 03:33:52 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:52 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:52 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:33:52 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:53 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:53 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) r1 = getuid() getresgid(&(0x7f0000000280), &(0x7f0000000440), &(0x7f0000000480)=0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x80, &(0x7f0000000640)=ANY=[@ANYBLOB="66643d0cbe17d35b26b5a74f3e9c3e6101c31d0e3db1260753211498454deeca9c6e9e730163959a074ff6fa940e700763a96bb9b9ac732f1bb46d55ccdee5dc8ba145073aa86868b408da5000d35f033e61037d0100000000000000754291f30b93bf16a92c7cf5d7670100000048aca4ebfb86c4a5c81a8d8272ba2750cfd517bd68cb107d7eb1594ee4d5dcc55ea43d6182bb07d0facd0e698fed10abf5049c72ac853de8b54abb6048d532f74788f0f164f451d847b0a7b746f1534b7b13574a6460ccdc7b0589fcce", @ANYRESHEX=r0, @ANYBLOB=',rootmode=000P0000000000000140000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',max_read=0x000000000000d137,\x00']) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") syz_open_dev$midi(&(0x7f0000000580)='/dev/midi#\x00', 0x3, 0x80080) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f00000005c0)=0x100, 0x4) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCSCTTY(r0, 0x540e, 0x1) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:53 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:53 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:53 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:33:53 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:54 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:54 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:54 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r2 = dup(0xffffffffffffffff) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) preadv(r3, &(0x7f00000016c0)=[{&(0x7f0000000040)=""/37, 0x25}, {&(0x7f0000000440)=""/207, 0xcf}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/78, 0x4e}, {&(0x7f00000015c0)=""/226, 0xe2}], 0x5, 0x40) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r1) 03:33:54 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:54 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:54 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:33:54 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:33:54 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:54 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:54 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:33:54 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:55 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:55 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:55 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:33:55 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000040), &(0x7f0000000200)=0x18) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r1 = dup(0xffffffffffffffff) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000440)=""/128) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:55 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:55 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:55 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:33:55 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:55 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:55 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:55 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:55 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:55 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:55 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:55 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:56 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4c757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8240a140badd5c0150738039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a7def717d082626c6c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b3240") r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hci(r0, 0xc00448fd, &(0x7f0000000440)="94739628b882b76fa9327f7fc707f13d9126439161e21f8569c656fb523f13e49fd877a5e91c717a3f33ce9bfd0b7b8c5a8b5fa539824d5b175ed49cedcec92db00a8fa3649e3a5a41336825ed083218526298182531d9e8c49850216e6d77509f26ddd4d54b865607b665365892f6b1b8dbb8c2a4285f23a88db3c91207f5cc65ec0ab0e8e856b837a46d6d0c2532f00318d9915d8613ce22708e2b591e853027773fd21c50eb4ae58ee89e3bfbf384ec0f7bf883561343ad46f8beed7fc77b90899e14860a9cb2b202d0619c22cf491b07698dfcc8388e04f6bb132d409ebe3bcb60a98a1dc0f08c57c804effb4624a19ce6fea2694475f15925741b7b57fbace30bbf7c8d3aa27458481ba06409e726d97bd0d021ea6b7783827f53270b309f94a45c36c4296360bf65cb3ee4331f775fef21d1661148e149e4ffb746b044a7e80ed15f61531c302e1c3d67fd4b47df09596df4b0f56f55fb91750cc5b6fdc4ad0659cbbc58e7cca96e2de6cc12b4b221e2e5a5d01894c097a375e24e9693246461f5ab5a721b83f162e6c05990e5bdc9e15b883098fd6f7e95c1b888398a3b6779a66ed98c9dcbf0a5571be10187a91d4b3f493f0f086616e33b64df81b2da2ebc20e47eddd7c2a1931f135e9d3101a085e395cc11d84ed89641305ac6c6e6d056179bdfb777cde218a0cc2e7e3c6a9ef2499590dfcb8e777435b2d98fa64bc49564fb6578e86a1801fa3569f00770d2eb1cee722a92d12e22dbde2c683df58d209db92088a2c58aeda60fd3b0b089f5fdae84e1029262c840c29e60213a6b6eb2626ab249fa66f3bbf49df84620214bcc2db6a368aa4680f09b6ac383dfbb753211efab1f9fa1d47b597cfe034824083f683cea42c2ae23a4c06dfab0b18d2ac6cc01164a58c88e33a1805edaf11f830a9a78f8b68a7a588d4fb48a8741f04d6d45f9c28ada31d8a382c9eaa18cedd4809ed747c151361c1213c59232a0ae86f2208bcf9617becb4d3ccd5b91398e93f1604943a18664756aa627082a021d0b506ecbeb85497cbc45a266634bc9dfc061b39dafaed9e75c0d71be515ea5b4a9700e9980dac4597615af30a65e7bb5c6bd18bb0ea8262e62d6ef7afde581900ee772278b24dd94a28fbffdad7583455f1a1d65f1af8c99809d1ae6ae91eb7bea9f87cb44d18eea2acd30bee485c3d6516d55cbaf273b538c67d770f5f3f2042c0a49bbf145dd038f9c91ff73aaa9b937460332da1797222454ce80872ea2ddc964752c654ea28213eee2a4a11928117c4b9832135e2ca1ad8deae831a282d92d546afccb15e7b99695f44d00d2674a49ba61f6ef32e0d5c24db0487fe8653af42d4b5a302f8dfaa449f8e0d746e4c2906c97f0a36456ae62402f8a64eeb59ef0889cbbbb5f2478c75c2b00b7eee8ccff67d89f64e9f4c7127dfe2ba0ed86305866d08c2a4d79ca8cb32853c0d908c3ffe9ba4ea98841db3db27a8fb25939aa72e6a19798e66bc7c282ea4d172ee72216f17d3e386373b52be3c019c3745b539c76b6fc1c697c6fb1216a4865ebfc8a6e333418aa0f5f065e607f0a4d8bd0886cb668ba4497915354869d4061fc64c5f049f9bbe683170b256a7abd67b19f37d9d4ff24bb7ddc2110ca64a13038b898da77e8572ff8b06ac3d68c43c6db8497c4deb64b7c0dc5205da22ae32f52c4cda65b0b0d64755b67aa32ffb7d0e08edc7d5ba90d168ed3b4511ccaae4bc80c6d795c6a369cf2ddb19f65b7f39189d30e885c6dad3bfb2ce5e104c18e65560d38a88b00947146d97c051611b587f9de353945609b2a3e1acd6b9546e8cc2dda5ab1f63e174d7c8396dda079bb8561878eb51f748ae5c0470c297a80d520ebe7cc9bd230e5381f4be13268aaf378194cf27284bd68c382e02ffbce4a23648c531bb54f1465aaf650d87d23e0bba70a9fa5fa7ccdb4f26f69d61c0e912668c9419745857177636ac5f42a44019a26e38c72ad627184e0c318b99ae4672733ebf7ff51f73af1d347165dbf2ab013331cb3a33761432c28bee2db37f39471c889b2d60419aa6572b860518834121fd72257f0d8ef16fc524178eb033c3173627a99c522808e8425adb1f7091f9c52ddeea5d5d1ef89cf853f74f19f8109580cb99b5059218f800b689dda72ccedf331e7303b8d1287cbaa58007012fa641187ee4327f09b3b4fcd0a13dd1a1bddc6d03267ce88fd516e46db7628e0d6805101692317fb4c0f18ee3b6eaa4d5905e4c3d68ad754378deb445d97123d5d6861e161e54b594b242152b849f3adf9f9ea10eabdac8285dc3eb324c1dc8ca676a094afcd9f8fb5cb763d344ba788969d437fa273b37ee71c0a5dce328877159218c80d05a2642aa1aae85479449c5afd2b9c8f3e937507f3575a50b7c87e297315fe2fa621d66c7aee3c88c4413cb7fde2fd99121f8c6cd4eefc040cb5d82575741c3be7473ad1abfc806a4c9e557efa992502b1739922a5490102cfc1c16dc1cd8a95877f4dba46b8c736a937c72cc5d03391515f2f106c0c8dd188fb7c9daf1c45f5b5d696981feb4105bfaba212b134f116cbc18299a952dea1bf64f9e5c9298edd9fe02bf233ee60248c168d97c911dbd478ac7468fa4b141b2050af0fe76a3bd10e326255ccff321eda9c294e12f05bc0971e90bae64e5f6c85b488f3e1c617eb446fa2c09d2abb36ba9e7d0661fb011c3e83bf043fb03685407422086bbe2f676e0e86aecc5529a8af64f021080b31150077272193652cc9847412e77d62b7efabf3e38a6d9e4dab2934eb5ee51a209ed5a19ea4216c5da65ee04fcddd66ab3e3157a4fde43858c2f936f9d9c09b57a8ad95aaac568cc09924e782bda52d841c01036ad3147891175f8fec7280f4e93e39bfe190e66e76aa11e12a5c9e8e5ae6675579d975dfc4ed22102f8fbd863e9ce68dc6ad95722cbaf1c3e7d48514af8adbee41111eceff8f98c8849537a61833b271cfb4c2b92dd4152c9897f0d5cb7624d2ce03e906b3b2f5931c9c0218516b0d9c45ea217657328eec978d5f9adf9ee787bacc0ab4587349a0cf66bab2f87fbacd6cf42ee405315f9b74fd576265253439d0ce1d2deca5308dce27ed2f94b93ec346149a11b3c1baecc15983ea6c17605ac34b42e51e76bc316d0bd18e4c759c2d79c0c920c20f88b6da61ff7ac9ee3d65566a1a5ea1a94ee776ed105d081ef1af3fc10841078a4a714c8cf188a95c4a11c04c563ee03addc0427fe842bdc3b0760b5d2a6fc948dfdeb85f887f2490600f2b5b7e22f73aeb4e99283e9b276c05f4c24ec771e4d0a3fb36a503d9c126e4215e72a915dd79584641e16eab1660fd7411e65a1fd0cf505a364563c23ca0b3002b166c89efd70cdd595d6724661cd654e23a1076d73bad7131cbb9470e0642a33464d5627c17dd31ff49c251b0aa606a21631ee85517d843859990488f985fe6bfa0e28f089248ec333d0f3237ded1a8a2ca1931490df6df9cb5912800a3eba1191313cc2f8e5ee43bd449deaa0336f114a999a252a42b44254fd1e97a91e43fee17ea84577dad05bc3b5d01960871fc69951a51e4e11e70f0e1ac40c4772d775d0b1731e9b6ee3b925597239ea9d4713353b1830864aeefa8c0e1a03268b7940079fb781af27dca3d9e79a81df931feb44cc8dcc8551b3a1b778ee9da58c4aaf2a6862034de079cd4f6405a816fbc8ecdb5fe6aaf0160da03e70ff3c817646848255feb36305e3dcdb63a4c00755f94901185e33401b83739f7ebc10ace72502d571ad464f94bdd00ee52f7e4f4940950cad7021d6ddac505855d71db8b98a27b3f311e77eee05cd8bd40a87c42092f9a81590f641dbfe0832313daa95cb19fac8bd1cde33ea0127b9ecee3940d40318c3a8a6affbd7bf5729a6e287d928bf0bd1f5df2159c44fbabdf01ca69355f51331dfbf0b6b6192202149ec326ca4142cb86c307f7146fec97dd1040f9033a738bf81dcbf2a4a3b094163f033afe0397bd7539d0f9c4951cfb794e2e15ce953154ca99be87a2a8572c3c1843975a5e8869ceab6985173d92282cd49607cb08036cfae88daa7e4f5428c67fe9b7cc807cda23f4dfa48cc2a35aec29ccb6788e6fc573952934160e179c55365edd60858bf00e347c1e1f4f525f7793132d10c3349ef4c9ffa507f4818204c8131ec815f27bfadfb57b75b41ca6733073d2d900aa89d65e02edc84816a23b7f7c482f423546070b49e670fb183dea477af77fb093dabc01a80891b0d2de34e6dce9d6b17596619d0682ddee7a3e34ec1fd3ddfdac54dc07b30aeddfca943b289162c91b1ef115ac0482fea34c601147d5a1f873e30ce5b80c14edf30ba1290611e4e5a554869fc54c595089de84ddf4ea0770ef184157178b742509bb6bcd63c9c0fa0d84483e4ef13c35a76593893daf4c0857c81e84208f4aa3872d74d46c990d3543660f832cd14499bae2a9c0e91d938c3eb3cf8ca7fc43537c6a633c8c5b356e0c8fe8c1ecaf1bb1e14bb516fe53570f5f39d8b8ebfdd2395a6acaed616d6cf1bbb5db2515feddada4c978c35e4a82da57e2a87a658fb6dc50b803b666f88a364149d0e8c195334c0515cddc8880f2a8c4d247cbea3f4a9fa7341029ac524969d0ddebf59166a2546eb1c0302ccad07ddf013f6d63ba745ca2f4ff9ba6c8ab6c7f79eb85fa7fa1ea49b887d4e4a4d46bf8b5a04b25112142de267073ecf03152981f6eddb29b4bb5ff6faa700c9a1f2516318e100ac40ad445fb79f206727c9261ad379f492d27b920b49a6d97cdfe1f4b40a1432e04a75558aa79324c637a8d4a224fe28b17a4ba901f0b8515669c48a8cf5e2c4e1f76e84a4ef8e8c4241b9723fb29085ca0c0d96f77e4b26ba129cb9f605982807352c4080d88ce5995aeb697c808832270140fcb83979e84693974f427b0c3b3c07d2d01cd90f7ac1616035732069c59091b787faaa42d831d7018a607bd6511f5ab4163a26b033b66e07734b4e17b47095f99f107aca43cd9630c9e6ed2b5f4376d97d6f0b588444b93e6705bfc1f22df3029794968300e79a1ab16084f4a88e848e900ecf407512dd416a13fbdab940b811c5b1c11b7eee370e1e673db7086ba2cfb87dea4914cf671d19aac922b178ca2f84f84306512d9507a3fb5893f52541a0783b4f0c2fff996193e3d554e47b1024ba1b8bbc107ee5bed71570807ee9f0497c631481196fa4b419c2f6e2378a86f00c7ce2cedd3cb950baf65524194d1c6ca94db44487b2b9c364fe79fa773bca9f92a9c97c57da59e057eb54c28136d149c3c40570438929e7ddb04aadc95f85a3710aa8d791440a254b726bead989d5c98e3e3e73088b88b7da78ec9a9152da68d8d18b86a5693753fb10c6ccc791942ba04bcf40d12a9cb1ec17994e7b3d2e412604eb414d2c625eac819d561aed9bc80e17c00cf2899b0e3f5e6f111dfbb344effcdc97d8743d598e9e80aa8ebdeab29516b45bd0a374c40bfd2686dd6280f9bac480fd05c1d7451d3d91af6e68ce945ed4f1fd72ebd45cff42b3b84bef33e64bf0b89d467d3658ecfde887a5f69f4e072112ca7b13941f40ce035baa33955040770a255acb61f62732b4078e8827db5fb41c13260505ef6b9e7059c6ebb8ae67f2f49db157a4be777f02acdab1b1101a3a4cee328f833e928cd98d740b727a4bb47c56c6ad4db464c3930f9fb0ce0a4850993519e30d7c64fe12f1b4e5976cc0fc79552d2b2832ade0110491d67f2af9a15e6120005490d08b9908e3d8e290e3d9b5a79764b1dc045") ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:56 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") [ 1312.374283] audit: type=1326 audit(2000000036.159:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7441 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 03:33:56 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:33:56 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:56 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:56 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:56 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") [ 1313.235682] audit: type=1326 audit(2000000037.021:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7463 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 03:33:57 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x80) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0xcf1) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280), &(0x7f0000000640)=0x4) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, &(0x7f0000000200)) dup(0xffffffffffffffff) write$binfmt_script(r1, &(0x7f0000000440)={'#! ', './file0', [{0x20, '%trusted!'}], 0xa, "4375c36c07dd3f50b312da013cea06cd8d8a1c86e0864ffd83c91b8a221b2867e850bb75d035dde3ab02ef4c1e87b90f065658058a7bcc392ca7d30cb0ca9dab432657f089c20d9b6ff249d5ab948924cd3e727fad66b2ba5f65d6d284e5a54130d58677444fedd604595b67b6167776bb5da9a26b0ca872b1f6661d333c872ca222c3ed14230ba8540f117e6ee9d2117da88405c6601c4c31db64b89e0bc8c354e2a3fb522a654e94a0930b14c8f9c4f04ed340016810916d6a59a1cd3d81a3dc7c4dcbc862351e13b6323b781659e4b45b6130ae188bb0"}, 0xed) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0505510, &(0x7f00000005c0)={0x5, 0x2, 0x7f, 0x4, &(0x7f0000000540)=[{}, {}]}) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989fd82531000000") 03:33:57 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:33:57 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:57 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:57 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:57 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") [ 1314.103504] audit: type=1326 audit(2000000037.889:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7487 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 03:33:58 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000480)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b929a4c757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8240a140badd5c0150738039443b1fdf5edebd7149a7edf77ad21560b38ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0c5b86cad180814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b324000") fcntl$dupfd(r0, 0x406, r0) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x5) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000240)={{0x77359400}, 0x0, 0x100000000000}, 0x18) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000200)={0x7, &(0x7f0000000040)=[{0x2, 0x8, 0x7, 0x3ff}, {0x200, 0xfffb, 0x1}, {0x8b9, 0x3, 0x80000003, 0x673a}, {0x1, 0x6, 0xdf4e, 0x81}, {0x4, 0x5, 0x3, 0x400}, {0x8, 0x6, 0x9}, {0x66, 0x7, 0x6, 0xd6}]}, 0x10) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000280)={0x5, 0x0, 0x8, 0xffffffffffffff8a, 0x3, 0xc561}) pipe2(&(0x7f0000000380)={0xffffffffffffffff}, 0x800) sendto$inet(r2, &(0x7f00000000c0)='`h', 0x2, 0x10, &(0x7f0000000340)={0x2, 0x4e21, @loopback}, 0x10) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f0000000580)) sched_yield() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:58 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:33:58 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:58 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:58 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:58 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:58 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) fcntl$setlease(r0, 0x400, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pselect6(0x40, &(0x7f0000000040)={0x2, 0x9c, 0x80000001, 0x0, 0x80, 0x2, 0x6, 0x2}, &(0x7f0000000200)={0x3, 0x40, 0x81, 0x99, 0x5, 0x7ff, 0x401, 0x9353}, &(0x7f0000000280)={0x0, 0x8, 0x7fffffff, 0xe000000000000, 0x7, 0xffffffffffffffff, 0x81, 0x40}, &(0x7f0000000440), &(0x7f00000004c0)={&(0x7f0000000480)={0x87}, 0x8}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:59 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:33:59 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:59 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:59 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:33:59 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:00 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0xfffffffffffffe44) get_mempolicy(&(0x7f0000000040), &(0x7f0000000200), 0xbd66, &(0x7f0000ffa000/0x4000)=nil, 0x0) dup(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/userio\x00', 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da0690f01eece41ff0f75370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:00 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:00 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="c4c14159c80fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175452f2ea9b81ab81a0d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:00 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:00 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:00 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:00 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:00 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:01 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) sendmsg$nl_crypto(r0, &(0x7f0000000480)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2001}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)=@delrng={0x10, 0x14, 0x2, 0x70bd28, 0x25dfdbfb, "", ["", "", ""]}, 0x10}}, 0x4000090) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8058fe4}]}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000b80)={0x1ff, 0xffe0000000, 0x101, 0x100000000, 0x9}, 0x14) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_mount_image$ntfs(&(0x7f00000004c0)='ntfs\x00', &(0x7f0000000500)='./file0/file0\x00', 0x2cf0, 0x8, &(0x7f0000000a80)=[{&(0x7f0000000540)="e04221683469fecd47fbcaba9d1c5f831175aef1441dec001c3b1c6bfb762b38e110ec71b12d991bdd03cfafec321d2f0297fb973ea770972f274354756ec4733ef404799d3158e27181b46afd007002c95c559f87581fe58a9025b5e3089aefc6d0ac65d4935077ee69afd642842defc41d067a36c540b8e1646ab13fc222bbc2884eccb1c3730a350ea56521536e9de0bf31ab5625e1601492257a1e676a42fb5e76e7683833262fe0c222a9f7947b455edc3fb22902cff39c50e81dc8f3abfcf5925ac75a7a831f851f75507cdc9ae74bd771efc16eaff3796c602de9723df567b5b4a1e8ee28f624ef3783b36f8952", 0xf1, 0xfffffffffffffffa}, {&(0x7f0000000640)="e5d461c4f23764b34c7a9235c476beabefb0e588e163eae3049bb49208ac04499f6391d8ba863bb4f29c16b644a6267eead97ebf6413306f9242e98797e170eafb828e2454c612025424328a6748809ee35fa9ecb8f60455fbf5804efb3a1d802bd83bc23e0af4bff1d2f42ac5e8fe73f3fa61b5df0ad00506219009454451e635afbc58315f35f14c22dc43e29a336b2ee8d2f4992ade2ab3f665e20e9ee1926505d6b6d0a29cf1d07c87c4712d0f5fd88da5d37d63d6827f8ea28dcf58b1ce95b985d13be9e1f12109ed93a1f2c62918ffd645d8ca4c7432c276038452c11dc0c27b155ca72ac7199ebd2a10", 0xed, 0x4}, {&(0x7f0000000740)="c5bbccaa938ac451cdc6f631d2235094bd120d9f1bed5da6cba2245103bf2e89098b59dd0d9970371bf7250b64f1a36a4f8d5b5464f450293a143654a316df59cfb812b838fda93fee136a36c87e5121ab8fc4a129706e5240e78e8bb15f9a9caa637631600c83bc18e1494e411eecb47eaad747776329e94cc881184be6755721c11b696ee3161117c60439905ef6d8e017", 0x92, 0x80000001}, {&(0x7f0000000800)="55b5e49cef756061ccece46184b479ca5bae825e41b80c68d32f2d94973bf00f62", 0x21, 0x1}, {&(0x7f0000000840)="f9467004e0e457b79f858e71ae6d6c2aa72ee56336dd47461a7d6bfb0afe2aadfff79b3fb2d459d42b94ca3f9967948cd5c3fe733a768e88cfc326e4cf83fa88e9f8c4f4e20c703fae7fed42c7fd07b72a207bf3fc85f4f6d6f3f5cd482939586b7c5b9f86a99a95c1a2eb", 0x6b, 0xfffffffffffffffd}, {&(0x7f00000008c0)="60cbb19f16ab2bda411f47ea75a72bd5e31197ea07b0c00343c8cc0dad796ded9e922d170a8f250001049135e2cdf8a3ac1d7ebcd4736012248cd30e17c3abf3424732d78c39fe27a7ce18688ddbe22bf631955111217cdcbe2fde5d750e0585995bb83d45ef120e", 0x68, 0x2}, {&(0x7f0000000940)="dbff6aa0134b1dd84309f1b58862b6f11e6ec8cd3418aebb576e1737bd6164c9af7b8f", 0x23, 0x20}, {&(0x7f0000000980)="1a925dcb3a9ac9c9e2cbab9ae64450b93e7230c8bfeea87b2e2e7cca3ac42d69341cfa21d4df214c07c4021466bed8c346bf3fcb28e182d95721edd599ddb47120eb5866808966101bd0173b24c0bf2bd48a36b9c308c35537c28c9079c708310a2a7a7469ee417970c4aec17830b5c1c929ba11e66be51d73bcd76ea7ef9ec771b18e45e8fff43db3437ad42096098398b74104313f6c582349dcb27595bf179ed4fdba554978c0a30dd7338e9b2d182cec245d1c2a5e3f58e2f12ba191f65b73bdf1d033553045cca5b5375b368ee8f115ad0bafc4886e23740d6d632fcaea", 0xe0, 0x6}], 0x28000, &(0x7f0000000b40)={[{@utf8='utf8'}]}) 03:34:01 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") [ 1317.381641] audit: type=1326 audit(2000000041.164:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7564 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x8050000 03:34:01 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:01 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:01 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:01 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:34:01 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:34:01 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:34:01 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:01 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:01 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:02 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:02 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:02 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:02 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:02 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4c757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8240a140badd5c0150738039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a7def717d082626c6c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b3240") syz_mount_image$vfat(&(0x7f0000000600)='vfat\x00', &(0x7f0000000640)='./file1\x00', 0xfffffffeffffffff, 0x9, &(0x7f0000000cc0)=[{&(0x7f0000000680)="2bf5f6d668ca5f50afbf38d9d5df098e6a159a07fa3895941819da06e79384a8c12bdca0db2735939de728d713689a717c9cc4bb83fc23db8ab69988efc922ea7eb9479b5664d7042628f3c546e20b5a8d43f8a3054fbb2d71b5bb0b894a926060d1c7a882a05dc850874e84a79a52d66fb5d9169a15e856650fa22e7f5fd4ca39019d146f4f0afed58daacf18e0af914e82e164fb6641287c23136ad1971340bb195aee6afabf1fac49d06ec9aa272515384a63ab2864e32b9199f3d55ce9a014d36de7594c435238d0071eac0c7cb5456602d4f53d4c0d92", 0xd9, 0xe86d}, {&(0x7f0000000780)="48e6e7a047a6c6021b4da21a7cc6b816c4f86be47de5fb0f67338b032de1f69acf13981d7883a4f747bafb58b7ae4e8a71802ed2d62267afbe02faf7fbcad5b779e3f2fe51ef8ade8ec4adb6722b8c4a5ea3e28b3a4abb560368e5538d9896aac61f4e64d3163b5fbccfd3440033d50a36a3ff307d27398c0f9481f7131264d916ac913b2bc42b2ea4d9a53db39b9cd30dfe022030686fe295e25d2b9367e39e76e9102528e5cd6127ef68242394de9027", 0xb1, 0x9}, {&(0x7f0000000840)="b1b95c0c1e0c6abd63526950f4e9e5ec4ba3b3fb086f5e4709b77626d7286cd20a5e15aac0bf7a3c0224dafdf19afa5af2a1db95f4b1821ae480ee4261dad0bbe119fce26b4b2310322c8ecd8e063dfa3799d91f2417fb64cab35ad4392787801392582ca15603bc069ab5994ea6d0a7455758cd43d5e7143e24cef545e3db83b9383ced7f04f9745325464e9dcaab47e40493de94e3ba672c5d08e7eaa008dbfda8ff9322d65fb79ae71637c7244948c3a2ee2acc975e0cbfff376bdf90cf29590ba8", 0xc3, 0x7}, {&(0x7f0000000940)="f4aff0b5000f6b1822ec0dad195f12ac40aa5506ca13c229826669903b78fb4292a007593f834b2f54dac75822679b9ac49adcc26ebd2a49d9e7de6b3034f4fec8dbe2b6aa59a5bd13e95016af6f0c1e7fdb05aff46e36de0314cdd018e0e86780c7ad26ac146d5d35855f9ad51452eb7a400c93c979b9c66c149691c5f16aee7fc3cf0ba9e89c91aa4b644daf1f7774550af1a1700f", 0x96}, {&(0x7f0000000a00)="655f8ad2071d", 0x6, 0x200}, {&(0x7f0000000a40)="baafe56a7de02be799a6042ff86da0b0bd4160817606c64d01888f36ed815481d9eeb29f32d81574acf6361d24ecb5ca94034e13fd4f8db0a22328a0c37b5adaec23af06cb941dc333b07c4ea61c0bc2322d1f581db0ee838716e3546360ac88807bbd0468cbd15864bf1166101db6e264934204aa919adfe559d870e0f491f5da9a1bddcdccebc2b043ec3083e2725d02e887e9fe98b117212a8cfd8ed91ab37666d8f42f46021c42baed27b526fbb5f0c61c9e59ab9f31de9947dc1cb6af69a325dfeb87b02f1d0941f6cb88c9ed43384cfd6211a325daf5f06822eb8fa97422edb61fa941a9e2cf5ba1", 0xeb, 0x4}, {&(0x7f0000000b40)="71e1c449f3d68dbcb24646e30598c70f1cd5", 0x12, 0x7}, {&(0x7f0000000b80)="40e5782de028bcd3bf676f7b25428c48dfc4ec1e22cba2c14fc4d7e19609e3a18c1859cc78920c1a406dc1de536fe390103d4903b02f5fb6a8e837771431b6b681cd64d25d97f3be64a0193bee6b7907d51be9f2f3d77151ed4e6293c906414f1f42e365a6fdd4a1035206957d9f49c4a544a401714a91f14aec9431a2bbe201d70302caf0ad7581321495f0340b73e6da5b4f7ad169c2e8be54dd2880417b3634fcc8cf24f14bfccca420fb022bae", 0xaf, 0x100000000}, {&(0x7f0000000c40)="5c48afb16a44a0c3c9428546ebe29f67718b8f096fa054714ba54f210faad3e7c2fdee6594971f3a4209cafad9a917eb7ffa8bf7533b7419b5e2efde063f1731f1bccaf9e845c49ab55a13b31d79af769d9d5ed0dc9e4afee5c6441203f47aa84eff7403459ffb53b4f45b7ee41435914113", 0x72, 0x1}], 0x2880, &(0x7f0000000dc0)={[{@utf8no='utf8=0'}, {@nonumtail='nnonumtail=1'}, {@uni_xlateno='uni_xlate=0'}]}) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)='/dev/vcs\x00', 0xfffffffffffffffb) r1 = add_key(&(0x7f00000004c0)='rxrpc\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)="7b5c8cbee7dcfe56030ecb6dc1d9e1d11be8c7b445ed1a4d7c66b87b23029b956b839aa941f19f79b2990d6f68c0ffcc7eab539cafacfc27a2ff0ea1ffb3c36cf065b605bc0e5e37508181737624554eebe605be242e196a74ed99e0e1b911770a8986da3c04efd5bd2e6928ebab36f025413fa7061da355bb5c276a58dfc2f182f2274d4b26c9b3c61fcaf489df344691e49de8ef9275e324f4ec4e18511e19", 0xa0, 0xfffffffffffffffe) keyctl$instantiate(0xc, r0, &(0x7f0000000440)="60c01c72e9b968bdd7700387dd1931c96a616dbdc7ba55a6add32e2c557cb91b1cfae50b9b5240f88b84c633df092116b41bc29a4d9b59790011984a4e9eecb88521e173a64280fd527673994f5baa533acb0c647c61c26817e894103bc2d8bcf72ec4604ffa3dd280bebef86f", 0x6d, r1) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:02 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:02 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:02 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:03 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:03 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:03 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:03 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4c757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8240a140badd5c0150738039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a7def717d082626c6c5b86cad18b84a603516c3cc0814c71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b3240") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200), &(0x7f0000000280)=0xb) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r1 = dup(0xffffffffffffffff) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0x20, 0x4) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:03 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:03 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:03 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:04 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:04 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:04 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4c757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8240a140badd5c0150738039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a7def717d082626c6c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b3240") r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000440)={0x0, 0x91, "f96f967498a5ee9a7945d4c6e482c4535dddb7145c7c4cc6325824e487c18cf76712acfe891a066f4361b09725d09a95a951509fae506597767860c13d14e32ecaa539a956071ceee28f96c31c11a3bed47b2185fd7c343d7652bab28d85f42d18ad24f832bde65aae0686bf231dc81b247d703f810b1bc5fca83a0d299ccfdcdda4cecd5bb68b9c5cfbd8828ca0b66c09"}, &(0x7f0000000040)=0x99) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000200)={r2, 0x9}, 0x8) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080), &(0x7f0000000280)=0x8) r3 = dup(0xffffffffffffffff) dup3(0xffffffffffffffff, r3, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:04 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:04 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:04 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:04 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:05 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:05 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4c757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8240a140badd5c0150738039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a7def717d082626c6c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b3240") getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x88, &(0x7f0000000580)=[@in6={0xa, 0x4e22, 0x7ff, @remote, 0xaa}, @in={0x2, 0x4e23, @rand_addr=0x4}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e23, @rand_addr=0x8}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e20, 0x6, @empty, 0x1000}, @in={0x2, 0x4e20, @broadcast}]}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000640)={r1, 0x8}, &(0x7f0000000680)=0x8) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000500)={0x3, 0x6, 0x3d, {r2, r3+10000000}, 0x4, 0x5}) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r4 = dup(0xffffffffffffffff) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000440)=""/186) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:05 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:05 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:05 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:05 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:05 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:06 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) fstat(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() getgroups(0x2, &(0x7f0000000200)=[0xee00, 0x0]) r5 = getgid() fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="16e20000c426e302000000000000000000000000000000000000000000000000", @ANYRES32=r2, @ANYBLOB="040005000000000008000300", @ANYRES32=r3, @ANYBLOB="08000200", @ANYRES32=r4, @ANYBLOB="08000400", @ANYRES32=r5, @ANYBLOB="10000000000000002000060000000000"], 0x44, 0x0) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) socket$can_raw(0x1d, 0x3, 0x1) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:06 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:06 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:06 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:06 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:06 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:07 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:07 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:07 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:07 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:07 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:07 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:08 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r0 = dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001200)=@nat={'nat\x00', 0x19, 0x4, 0xd88, [0x20000440, 0x0, 0x0, 0x20000f40, 0x20001168], 0x0, &(0x7f0000000080), &(0x7f0000000440)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x5, 0x20, 0x88f5, 'ipddp0\x00', 'veth1_to_bond\x00', 'veth0\x00', 'lo\x00', @local, [0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x950, 0x950, 0x988, [@among={'among\x00', 0x8b8, {{0xffffffffffffffb2, 0x3, 0x2, {[0xfffffffffffffff9, 0x5, 0x1, 0xfffffffffffffff8, 0x5, 0xd9, 0xcda, 0x100000001, 0xe23, 0x6, 0xd2, 0x6, 0x4, 0x0, 0x7ff, 0xffffffffffffff80, 0x3, 0xfffffffffffffffd, 0x6, 0x264, 0xd, 0x6, 0xfffffffffffffc01, 0x4, 0xffffffff00000000, 0x4d, 0x7, 0x3f, 0x400, 0x7, 0xfffffffffffffffe, 0x200, 0xffff, 0x2, 0x1, 0x6, 0x8, 0x80000001, 0x0, 0x100, 0x8, 0x101, 0x200, 0x1000, 0x2, 0xfffffffffffffff7, 0xffffffffffffb1d8, 0x8001, 0x0, 0x1, 0x4, 0x3, 0x1, 0x2, 0x100000000, 0x0, 0x80000000, 0x40, 0x4, 0x8, 0x9, 0x1, 0x9, 0x80000001, 0xffffffff, 0x3, 0x4, 0x9, 0x7, 0x7, 0x80000000, 0x7, 0x101, 0xff, 0x5, 0x80, 0x6c, 0x5, 0xd0, 0x7, 0x33ea, 0x4, 0x5, 0x9b, 0x7fffffff, 0x0, 0x10001, 0x9, 0x8, 0xd616, 0x5, 0x1, 0x10000, 0x4a, 0x80000001, 0x0, 0x8, 0x40000, 0x4, 0x37264f7, 0x100000001, 0x2, 0x4337, 0x711, 0x8, 0x4, 0x7ff, 0x6f5, 0xe000000, 0x2, 0x2, 0xe9a, 0x7, 0x3, 0x80, 0x598, 0xfff, 0x1ff, 0x5, 0x101, 0xee, 0x9, 0x0, 0x9, 0x700000000000, 0x6, 0x45, 0x7, 0x1, 0x7fffffff, 0x7, 0x5, 0xfffffffffffffffe, 0x1f, 0x0, 0x7, 0x8, 0x97, 0x8, 0xfff, 0x7ff, 0x4, 0x8, 0xce, 0x2cfd, 0x2, 0x100000000, 0xffff, 0x1ff, 0x1, 0x5, 0x8, 0x8, 0x8, 0x3, 0xffffffff, 0x2, 0xb1d2, 0x2, 0xec, 0x2, 0x5, 0x4, 0x8, 0x80, 0x1, 0x3f, 0x7fff, 0x8, 0xbd, 0x9, 0xfe, 0x0, 0x0, 0xfffffffeffffffff, 0x5, 0x2, 0x0, 0x3, 0x2, 0x0, 0x3, 0x0, 0x7fff, 0x0, 0xd0, 0x2, 0x40, 0x5, 0x4, 0x1, 0x1, 0x1, 0x4, 0x2, 0x141a4884, 0x4, 0x1, 0x8d1f, 0x800, 0x6a, 0x6, 0x4, 0xfffffffffffff000, 0x9, 0x2, 0x9, 0xff, 0x2, 0x2, 0x40, 0x3, 0x54dd97f6, 0x164, 0x46a, 0x2, 0xffffffff, 0x9, 0x28b, 0x1, 0x6, 0x80000001, 0x401, 0x0, 0x2, 0x6, 0x8000, 0x2e, 0x8, 0xd9fc, 0x1000, 0x342, 0x270, 0x8, 0x3ff, 0xfffffffffffffff8, 0x4, 0x7, 0x2, 0x5, 0x816, 0x20000000, 0x1fffc0000, 0x2, 0x7ff, 0x81, 0x8001, 0x3, 0x7, 0x4f4, 0x0, 0x0, 0x5, 0xfffffffffffffff8, 0x8], 0x3, [{[0x0, 0xec6], @remote}, {[0x3, 0x9], @loopback}, {[0x8, 0x80000000], @loopback}]}, {[0x8000, 0x1, 0x0, 0x2, 0x4a87, 0x6, 0x0, 0xffff, 0x6, 0x2, 0x10001, 0x7, 0x8, 0xffffffff, 0x3, 0x100000001, 0x4, 0x100, 0x9, 0xe46, 0xa0, 0x0, 0x34fe19f9, 0x20, 0x20, 0x7, 0x40000000000000, 0x9, 0x2, 0x1, 0x100, 0x3, 0x2, 0x8, 0x8, 0x8ca, 0x100000000, 0x4, 0x0, 0x20000000000, 0x0, 0x3f, 0x0, 0x5, 0x9, 0x940, 0x8000, 0xc4a, 0xfffffffffffffffb, 0x7, 0x10001, 0x8001, 0x40, 0x8, 0x81, 0x9, 0x882, 0x3, 0x0, 0x5, 0x0, 0x400, 0x80, 0x3, 0x6, 0x6, 0x8, 0x8, 0x4, 0x2, 0x0, 0xc536, 0x7, 0x8, 0x0, 0xfbd0, 0xffffffff00000, 0x80000000, 0x8, 0x80000000, 0x7, 0x2, 0x401, 0x200, 0x1000, 0x7, 0x8, 0x7, 0x6, 0xf383, 0x10001, 0xffffffff80000001, 0x7ff, 0x3, 0xbb6, 0x10001, 0xd1, 0x1b7f, 0x380000, 0x48, 0x0, 0x45c, 0x0, 0x5, 0x6, 0x101, 0x6, 0x20d, 0x7, 0x8, 0x3, 0x7fffffff, 0x1, 0x20c9, 0x6, 0x6, 0x100, 0x9, 0x1, 0x25a7867, 0x8f, 0x9, 0x7, 0x9, 0x217, 0x2, 0x9, 0x7, 0x43, 0x1, 0xfffffffffffffffd, 0x200, 0x8, 0x6, 0xff, 0x6, 0x1, 0x5, 0x58, 0x800, 0x2, 0x288, 0x6, 0x1, 0x779b, 0x6, 0x7539, 0x1ff, 0x5, 0x2, 0x7, 0x99c3, 0x30b19886, 0x101, 0x1, 0x0, 0x7, 0x3, 0x1, 0xffffffffffffff81, 0x2, 0xee, 0x8, 0xc9a, 0x1, 0x4, 0x0, 0x2, 0xfffffffffffffffc, 0x20, 0x7, 0xf257, 0x0, 0x8, 0xff, 0x3bd, 0x0, 0x5, 0x3, 0x20, 0x100, 0x8, 0x5, 0x1, 0x5, 0x10000, 0x2, 0x401, 0x8, 0x80000000, 0x0, 0x0, 0x80000000000000, 0x51, 0xe3, 0x0, 0x4, 0x8, 0x4, 0x3, 0x2df1, 0x8001, 0x539, 0x1, 0x0, 0x40, 0x3, 0xfffffffffffffff9, 0x1a6cba65, 0x80000001, 0x800, 0x2, 0x8, 0x5978, 0x6, 0x3, 0x2, 0xff, 0x0, 0x80000000, 0x20, 0x0, 0x7, 0xde7, 0x0, 0x3, 0x3ff, 0x1, 0x0, 0x2, 0xffff, 0x0, 0xffffffff, 0x81, 0x6, 0x0, 0x81, 0x0, 0x10001, 0x4, 0x81, 0x401, 0xc7, 0x4, 0x0, 0x1, 0x6, 0x8, 0x3, 0xfff, 0x7, 0xfffffffffffffffa, 0x10000, 0x916, 0x20, 0x5, 0x8], 0xa, [{[0x9, 0x7]}, {[0x4, 0x400], @rand_addr=0x5f5c}, {[0x400, 0x3], @remote}, {[0x6, 0x100000000], @rand_addr=0x8}, {[0x4, 0x3f], @remote}, {[0x375, 0x7f], @multicast2}, {[0x1000000000000, 0x8], @loopback}, {[0x7, 0x3]}, {[0x2, 0x40], @multicast2}, {[0x9, 0x9], @loopback}]}}}}]}}, @snat={'snat\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}}, {{{0x15, 0x40, 0x10, 'veth0_to_team\x00', 'bridge0\x00', 'erspan0\x00', 'sit0\x00', @broadcast, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], @random="b646308c438a", [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], 0xa0, 0x110, 0x148, [@connlabel={'connlabel\x00', 0x8, {{0x5, 0x3}}}]}, [@arpreply={'arpreply\x00', 0x10, {{@broadcast, 0xfffffffffffffffc}}}, @arpreply={'arpreply\x00', 0x10, {{@dev={[], 0x17}, 0xffffffffffffffff}}}]}, @snat={'snat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x2, [{{{0x11, 0x48, 0x8906, 'veth0_to_team\x00', 'syzkaller0\x00', 'veth1_to_bond\x00', 'ifb0\x00', @empty, [0xff, 0x0, 0xff, 0xff], @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], 0xa0, 0xd8, 0x110, [@cpu={'cpu\x00', 0x8, {{0x2, 0x1}}}]}, [@snat={'snat\x00', 0x10, {{@broadcast, 0x7e68f53bfc2e3304}}}]}, @snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}}, {{{0x19, 0x20, 0x88fb, 'ip6_vti0\x00', 'rose0\x00', 'erspan0\x00', 'veth0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0xb0, 0xb0, 0xe8, [@quota={'quota\x00', 0x18, {{0x1, 0x0, 0x3, 0x4}}}]}}, @snat={'snat\x00', 0x10, {{@local, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff}, {0x0, '\x00', 0x4}]}, 0xe00) 03:34:08 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:08 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:08 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:08 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:08 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:08 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040)={0xffffffff, 0x9, 0x7e9, 0x10000}, 0x6) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:09 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:09 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:09 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:09 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:09 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:09 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r0 = dup(0xffffffffffffffff) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000040)={'vcan0\x00', {0x2, 0x4e21, @loopback}}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000200)=""/7) 03:34:09 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:10 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:10 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:10 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:10 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:10 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4c757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8240a140badd5c0150738039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a7def717d082626c6c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b3240") openat(r0, &(0x7f0000000200)='./file0\x00', 0x446000, 0x0) syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast1, @in6=@remote}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f00000000c0)=0xe8) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0xff, 0x8f8) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)=@random={'os2.', 'vboxnet0\x00'}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") set_thread_area(&(0x7f0000000080)={0x3, 0x100000, 0xffffffffffffffff, 0x5, 0x100, 0x3, 0x2, 0x400, 0x0, 0x5}) 03:34:10 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:11 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:11 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:11 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:11 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:11 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:11 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) write$P9_RCREATE(r0, &(0x7f0000000040)={0x18, 0x73, 0x2, {{0x2, 0x1, 0x3}, 0x3}}, 0x18) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:12 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:12 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:12 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:12 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:12 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:12 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(r0, &(0x7f0000000200)='./file0\x00', 0x4, 0x2) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:12 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:12 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:13 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:13 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:13 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:13 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4c757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8240a140badd5c0150738039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a7def717d082626c6c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b3240") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000040)={0x8, 0x0, 0x8}) fcntl$getownex(r1, 0x10, &(0x7f0000000200)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:13 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:13 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:13 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:14 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:14 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:14 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") setrlimit(0xf, &(0x7f0000000040)={0x1, 0x4c}) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r0 = dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000200), &(0x7f0000000280)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:14 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:14 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:14 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:14 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:15 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:15 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r1 = dup(0xffffffffffffffff) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x9) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") fcntl$getownex(r0, 0x10, &(0x7f0000000040)) 03:34:15 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:15 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:15 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:15 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:16 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:16 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4c757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8240a140badd5c0150738039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a7def717d082626c6c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b3240") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x7, 0x40) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000200)) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:16 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:16 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:16 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:16 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:17 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:17 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:17 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") r0 = syz_open_dev$usbmon(&(0x7f0000000440)='/dev/usbmon#\x00', 0x6, 0x8000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(r0, &(0x7f0000000300)={{}, 0x1000, 0x111}, 0x18) dup(r2) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLOPEN(r3, &(0x7f0000000480)={0x18, 0xd, 0x1, {{0x1, 0x4, 0x5}, 0x401}}, 0x18) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f00000002c0)="2543b293a9bc05607c09ae2d53a6f3a3", 0x10) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) r5 = getgid() openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x80, 0x0) setfsgid(r5) fsetxattr$trusted_overlay_origin(r4, &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x3) syz_execute_func(&(0x7f0000000500)="42805da0690fef69dc0f01eec4a141e314c241ff0f370f382193c4c19086d9f28fc4e111755b3bdbe36b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:17 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:17 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:17 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:18 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:18 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:18 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:18 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f00000006c0)="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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000340)={0x0, 'bcsf0\x00'}, 0x18) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000380)={0x0, 0x22}, &(0x7f00000003c0)=0x0) timer_delete(r3) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") mkdirat(r1, &(0x7f0000000480)='./file1\x00', 0xc3) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x20048000}, 0x800) 03:34:18 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:18 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:19 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:19 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:19 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:19 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:19 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x41) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x8000000002, &(0x7f0000000280)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r1 = dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r1, 0x5462, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:19 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:19 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:20 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:20 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:20 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:20 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:20 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0xffffffffffff9e3b) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:20 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:20 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:21 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:21 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:21 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:21 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000580)='/dev/nbd#\x00', 0x0, 0x2400) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r1 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000440)={{0x3, 0x3, 0x2, 0x3, 0x7f}, 0x419, 0xff, 0x3f}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='maps\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = getpid() getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0xffffffffffffff7f}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000005c0)={r4, @in={{0x2, 0x4e20, @multicast2}}}, &(0x7f0000000680)=0x84) sched_setscheduler(r3, 0x5, &(0x7f0000000200)) writev(r2, &(0x7f0000001400), 0x0) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0xc) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f00000004c0)={0xff, {0x2, 0x4e20, @remote}, {0x2, 0x4e20, @rand_addr=0x200}, {0x2, 0x4e24, @broadcast}, 0x0, 0x5c6, 0x1b, 0x2, 0xa9, 0x0, 0xffffffff, 0x20, 0x3}) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000040)) sched_setscheduler(r3, 0x3, &(0x7f00000006c0)=0x8) seccomp(0x0, 0x1, &(0x7f0000000280)={0x2, &(0x7f0000000200)=[{0x2f89, 0x401, 0x1ff, 0x1f}, {0xffffffff935cc4ff, 0x9a, 0x404, 0x7fff}]}) seccomp(0x1, 0x40000, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:21 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:21 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:22 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:22 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:22 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:22 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r2 = dup(0xffffffffffffffff) write$P9_RSETATTR(r0, &(0x7f0000000480)={0x7, 0x1b, 0x1}, 0x7) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000240)={0x3, 0x7fff, 0x7, 0x8, 0x40}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$set_timeout(0xf, r3, 0xfb) seccomp(0x1, 0x1, &(0x7f0000000440)={0x8, &(0x7f0000000280)=[{0x800000000000000, 0x1e1b, 0x7, 0x1ff}, {0x9, 0x3ff, 0x7, 0xb4}, {0x0, 0x100, 0x6, 0x9}, {0x5, 0xfffffffffffffbff, 0xe081, 0xffffffffffffffe1}, {0x0, 0x6, 0x8, 0x8}, {0xf49, 0x8, 0xb1, 0x719d}, {0x8, 0xfff, 0x4, 0x1ad}, {0x200, 0x59a, 0xdce, 0x5}]}) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000200)=0x6) 03:34:22 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:22 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:22 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:23 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:23 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:23 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r1 = dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$NBD_DO_IT(r1, 0xab03) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000200)='./file0\x00', 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:23 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:23 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:23 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:23 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:24 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:24 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) write$binfmt_script(r0, &(0x7f0000000440)={'#! ', './file0', [{0x20, '/dev/vcs\x00'}, {}, {0x20, 'nodevcgroup'}, {0x20, '-cpusetposix_acl_access'}, {0x20, '/dev/nbd#\x00'}, {0x20, '\'*wlan0'}, {}, {0x20, 'procloself[em0!'}, {}, {0x20, 'ppp0'}], 0xa, "1f45cd958f782f2a1b848c73a9d1d3f87d1490cebcf4d14c03a46c6d570361c486d7f10e8e61d91b3ae79eec62ff4b233d7a5768c1b028b74be72b3fd8204dfbd7b970ee00b9e1a95b76ea311de3e94b2c3a3507f9b0cf74bfade4b16c9e8402672ae449b80fe1871949041db0970a03314dea68d2c5a22cd6234bedef83604aacdd059908567ff1303d429876bfb57f19bc52dde80fcb93b13d849c623a8aea7afc80fc40de1f91a1a5a269bd37b1adcf5384aacd005dda70baa313ab38ce0fb830607c507f09aceef538560757faf1669d92cacbfa7021bea76f6f33eb79a5b3d029980202dfa8878bfd4a3f3745bd"}, 0x154) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r1 = dup(0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0xfffffffffffffffd) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:24 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:24 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:24 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:24 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:24 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:25 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000200)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) r2 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r3 = dup(0xffffffffffffffff) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_mount_image$vfat(&(0x7f0000000600)='vfat\x00', &(0x7f0000000640)='./file0\x00', 0x5, 0x7, &(0x7f0000000a40)=[{&(0x7f0000000680)="843e75707d72a468439ced06b65ef13d49422e1d03f8a985efb12cd26035d9cf7c08ad08da0837cb6ae7f66580c7316ebe3fc00ddc56d37ba0cfc6ded3ccfe1eb1fe629d017fe1e72ed32c48e343a6993184ca68cfb347993b2aa53f06b64b71d0a3307cdc74abd72e211c7e4473f9c0c5ba9f1e25644e3b7a3dd2", 0x7b}, {&(0x7f0000000700)="13ddea20f4ad34e9aea412f9fef9020e9b6324e8fd9a3c203b99a5bae8759df395b007f8933dc4c30df9a64cffbf4ef5e5a8a0ae0547d6ec35ea2d840df3b12015b264c17f2025756dbeaf238810ae19e09eba94011aaeef4554c78b772fc3686f040c78e7d055d2dc0855343e1c3457dee97f26c2c725816b03bd2b0365c3e891a15b2591aa3e299311d880c4962c1c4878a2cb5d0d3a083e19dcdaaadf2dcda279cae1fd428d45311d039d7871453bbd2c22975b15b379b38917be4ccdd0f8caab88d9d7cfbc7eee587f79", 0xcc, 0xfff}, {&(0x7f0000000800)="8cb52f", 0x3, 0x1f}, {&(0x7f0000000840)="da210014c4eabb34512dfcefa279289e22e3790776a328913d3debe268f4b13444d2f58ee73e7d1c7a897b65d7f43511d05637c13748dcbe9f050838da594d73c29ed671206d4aa04d6b00e8801994913d92", 0x52, 0xfff}, {&(0x7f00000008c0)="32f5859003cc485019f1112ab055e508fecc0951cd847cb2cba3a627a85065b7a8cbfa7c4f0af5396cbc5e7495356c43bdb59c835022cab3ad32ae255da37ba1d9622de47a775ef840ba2ac4ab4ba4438520", 0x52, 0x8}, {&(0x7f0000000940)="a53de29ecffafcccde2ba699622354b89b29d884e265ccc4f201360161efac36163dec3fee71eeb4eb66e28ea9b8e1c32cb1427731a8ca1596da6fedc558e95ef182463d2418f8f5f3a651592d8211bd4728a235e765a9dc30fb738756d2ca860375178e948706cb6baa2631782a1a44715e998d12056e5aa1a8b5bf109ba5712eb6045bf047879917d657d2134f381fef0a7524a1e2aba2695f24b64376e570ad4b128aa704b672b9244a116db13e453aa59f732610a413f7af25", 0xbb, 0x5}, {&(0x7f0000000a00)="e32c9fbd73bdfc981c2eb8a4705f008c54ccba4963b1aad995e073f3f2d3a9dd990d3bf054b85ba93233581a5ef071", 0x2f, 0xfffffffffffffffd}], 0x0, &(0x7f0000000b00)={[{@nonumtail='nnonumtail=1'}]}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000440)={{{@in6, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) r6 = add_key(&(0x7f0000000540)='cifs.idmap\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000005c0)="4c19947a7d19aab2ec3e1c9d7ba34befea47210834be76e25519fb5efabd53eb1673f4", 0x23, 0xfffffffffffffffe) keyctl$get_persistent(0x16, r5, r6) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f0000000c40)) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ftruncate(r3, 0x2) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000b40)={0x0, 0x7}, &(0x7f0000000b80)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000bc0)={0x5, 0x202, 0x7, 0x8000, r7}, 0x10) [ 1341.416685] FAT-fs (loop5): Unrecognized mount option "nnonumtail=1" or missing value 03:34:25 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:25 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:25 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:25 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:25 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") [ 1342.216697] FAT-fs (loop5): Unrecognized mount option "nnonumtail=1" or missing value 03:34:26 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r0 = dup(0xffffffffffffffff) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040)=0x1, 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") sendmsg$nfc_llcp(r1, &(0x7f0000000880)={&(0x7f0000000440)={0x27, 0x0, 0x2, 0x7, 0x5, 0x7f, "1e3a7cdc3fc964e7d3b1fed8438ba95b687f64b7a3f359ebe1c26cf4e7b8b5e86236ddb011f30c08a9e36a811ebf7dca114c5eb61a224ab231aaec85ef66a7", 0x2}, 0x60, &(0x7f0000000700)=[{&(0x7f00000004c0)="587e4a651340f37ee7793cd8d4d2ef3a6fc6c526e17466d758ca562270e6b75be0d56b3f55504257b694e2ce7e40880eb3e1dd09523308c4fb06049b4e07f747163a8e62e2cddb20a499902b91", 0x4d}, {&(0x7f0000000540)="9205c286082bb146bd7036fc1139cdbcbc29061035d3ad5867eb78e2cb498c45e741b6a690d17fb8e4521271bbbac8a951ee50b17b47d0d44922de86028a3ffffedbff6de64a008995a680e6ebdff235110b34d3b2e13b6243cb6fe6e7169a8738b9304864f774eac975d360aa95c75ab4e950269aec775422e2861cf9605a5b07d1a2ca8f1f72f613ecbe6f5f0411133a970f2b2a1482f049e21f6c94b4bd68f3052790ee34cf6c3da5", 0xaa}, {&(0x7f0000000200)="210904be3cbe0f55b21d01ecd67d65eb9d30af90cf64bb125e537d25eb2fae92f81d01a821040a608614dafe696e691a200b6684116bf8d384", 0x39}, {&(0x7f0000000600)="74089fca175db7c658523d09df88d47e4569b645289cd8ba092c620cc067e85c94ee48863bc93f02ad64b3f8fee7d149adec96236a4c5ad8e28d4628dc345c31369daf190c77f17124f04387ab7c2006d7d51fecb3c60dfe4813bf1806b6fd21b7fed90e5dfb7a0dd8b27cf9d064f61eb8558bcf2e23be43e186ddbc5ffd8196a0769fc06782acd023a3c4e57e0dcc016f526282ba859256adc86e1dea533466e3f20f25f6fe46ad3fa1b0ded8c5a88845ec367f066c64664a1e3f241426a5951a335b962e271eafdd789cbe9bd92b47a85c2d2a3aa77043279082e374ed9add2ca0e14dbe4e2f87d45a0e167adeb735c9df899a74ba", 0xf6}, {&(0x7f0000000280)}], 0x5, &(0x7f0000000780)={0xf8, 0x115, 0x80000001, "a2d1e9c3e4d1932511975252fcc24a3db6befae5e5297ca542c6a7c13e75f556056e40a2003e4e61986dc21b76753905c8d445285fd6409c9fd05d7cdbc52c2f4322e2966a33eaf114041cefa11a2ad24e2e42778f7078270a722426e4fadc478cabf68df3275a97b1e290711a088e80cf5ebba8ab16216754b467c49debe0e849f2bcb16ab8646d0e8242e84cad6aed86c934966536f21e13e00d1d4a63d680a65e44b6edbf9d56456af59a65f6fd22acac88fadf625b4e082cd716723c7e709a1ed0205f77697004011b7131b55fd8e025dc943386a2a01a0806c3f2945c59934d2a6e5ac80f7d"}, 0xf8, 0x4040800}, 0x800) 03:34:26 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:26 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:26 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:26 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:26 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:27 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x10000, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000040)) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r2 = dup(r0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000440)={0x8, 0x81cf, 0x400, 0x690, 0xfffffffffffffe00, 0x9, 0x6, 0x100000000, 0x5, 0xffffffffffffffff, 0x6, 0x101}) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000280)={0x2, &(0x7f0000000200)=[{}, {}]}) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:27 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:27 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:27 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:27 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:27 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:28 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:28 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'bond0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000540)={'team0\x00', r1}) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000440)={{{@in=@local, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000200)=0xe8) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xc4) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) timerfd_gettime(r0, &(0x7f0000000180)) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)=0xfffffffffffffc00) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:28 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:28 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:28 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:28 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:28 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:29 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:29 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4c757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8240a140badd5c0150738039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a7def717d082626c6c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b3240") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f00000004c0)={'filter\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f0000000440)=[{}, {}, {}, {}, {}], 0x0, [{}, {}]}, 0x98) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x9, 0x400200) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:29 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:29 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:29 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:29 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:29 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:30 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x2a) ioctl$TIOCSBRK(r0, 0x5427) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0xfffffffffffffffc, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000440)=[@in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e24, @rand_addr=0x100}, @in6={0xa, 0x4e20, 0x1, @mcast1}, @in6={0xa, 0x4e20, 0x2}, @in6={0xa, 0x4e21, 0x100000001, @dev={0xfe, 0x80, [], 0x14}, 0x5}, @in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e20, @multicast2}], 0x94) 03:34:30 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:30 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:30 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:30 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:30 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:30 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:30 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:31 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:31 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:31 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:31 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:31 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000440)=0xd86, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) epoll_wait(r1, &(0x7f00000004c0)=[{}, {}, {}, {}], 0x207, 0x3) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x10000000000) clock_gettime(0x0, &(0x7f0000000140)) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000280)={0x100000001, 0x81, 0x3, 0x15e, 0x1, 0x1, 0x4, 0x16, 0x4a51, 0x6}) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000040)={0xc29d, 0x2, 0x3, 0x200, 0xf1, 0x8, 0x20, 0x5, 0xf4d2, 0x86}) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000200)=0x6) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000480)=0x0) capget(&(0x7f0000000500)={0x19980330, r2}, &(0x7f0000000540)={0x20, 0xd7, 0x4, 0xfff, 0x10000, 0x1ff}) semget$private(0x0, 0x0, 0x220) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:31 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:32 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:32 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:32 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:32 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:32 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4c757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8240a140badd5c0150738039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a7def717d082626c6c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b3240") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r0 = dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000440)={'filter\x00'}, &(0x7f0000000040)=0x44) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:32 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:32 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:33 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:33 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:33 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:33 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:33 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x8000, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r1 = dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000700)=[{&(0x7f0000000440)="47da6057af93809d8b9df91d878b5180c279f5cde99065a8e1d21f9da19ee9ac23b847508758f5b30a7274170cf9b64c6be5122b9a50c4fd2ef5f4d2da2e101e340f06dd6712c8a4c331cfa5119458a29c9851d0d235e88797ea46d0790fc40c032f6e3d8216b24980aa8438aeee21cd894943b6f6515e3424fcb93b53912de0", 0x80}, {&(0x7f00000004c0)="128dbf4e70cc778beb27d7832afbca6e39372b8215124fa17df2404d397071023fdb33e7ceef412a5674a5bbbbc2e47ff119dfc4d2be828865e1785cbbacca187ee1d9a516992c2a727b3fce740924ea4725eec649eb1f256912c9155d46777039f0b56e7c2a2fedfa", 0x69}, {&(0x7f0000000540)="ca292d2a7f29056fbaf49d7ff4d7cbee6686549d77bc7543049e52ca1f80bd6d1de8ae94b82d0f78f6faf0accda4c49cc5c2eb4e52f3370f670d4812491f1920720a331e86e0e6e343d72ee9b8ecc32172473b25370d34af76bdca4ad7725254e81376fc0a2e112df12f50786b2ffcb5f71ba6", 0x73}, {&(0x7f0000000040)="438690eeef92d3cce5f337753bc2abe9141920aa785f2f1226665aed59edd5e23deac237ebbc1b08caafbf3da522de16ef907a4902f4ffcfef5452a4d1", 0x3d}, {&(0x7f00000005c0)="91a952796f52efd3520fb7e0b469ea2e40ad0bd7796f1b4c55207fff9da37250110e75852ede83fc2a8792b3a10c5bc32022e31f8e9148e2ebe6e3518b66d38d1da4cdd58bd0f157772a5cb4d0c3d308bf05fe3ecc0c568c13710124957a3a8bfd23c9951d166c4125ba973d24e5", 0x6e}, {&(0x7f0000000640)="d257d45f13494e06fc0614c760bbfce3c4b28ad1a751812ed78263ab6d82839a9933fd6db68da521f199734474a1a77e4e5735bdd555db47fdc5d54d66075c76df01a60726e83ffed39bc373cdab9dafaeb88f296efff7817c777011747740a2ec68620e8d3472b69117f0bd8c4a03dfc723931e8f6c29c873d23fff848725a63a18b72cbe964918e8e3cf", 0x8b}], 0x6, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@loopback, 0x0}, &(0x7f0000000200)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000002c0)={r2, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) syz_execute_func(&(0x7f0000000780)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c190c4d9f28fc9410feefa6b2179a6e5e58fc978cb5aff0f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:33 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:33 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:34 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:34 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:34 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:34 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4c757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8240a140badd5c0150738039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a7def717d082626c6c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b3240") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$TIOCSBRK(r0, 0x5427) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:34 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:34 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:35 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:35 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:35 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:35 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:35 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0xfffffffffffffffc, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(r0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x22}, &(0x7f0000044000)) timer_delete(0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:35 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:36 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:36 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:36 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:36 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:36 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:36 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r1 = dup(0xffffffffffffffff) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x7) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r1, 0x28, &(0x7f0000000280)}, 0x10) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000040)=0x8, &(0x7f0000000200)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:36 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:36 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:36 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:36 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:37 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:37 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:37 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:37 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:37 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:37 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:37 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:37 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x8, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:37 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:37 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:37 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$bt_rfcomm(0x1f, 0x80004000000001, 0x3) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) membarrier(0x21, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") write$P9_RMKDIR(r0, &(0x7f0000000040)={0x14, 0x49, 0x1, {0x2, 0x2}}, 0x14) timerfd_create(0x5, 0x80000) [ 1353.991333] audit: type=1326 audit(2000000077.776:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8476 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 03:34:37 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:38 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:38 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:38 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:38 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:38 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x100, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") socketpair(0x19, 0x7, 0x10000, &(0x7f0000000200)) [ 1354.841997] audit: type=1326 audit(2000000078.627:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8496 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 03:34:38 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:38 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:38 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:39 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:39 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:39 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:39 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:39 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:39 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:39 executing program 1: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:39 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") [ 1355.698905] audit: type=1326 audit(2000000079.484:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8532 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 03:34:39 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0694040ef69dc0f01eece41ff0f1837c4e27922ce0f382193c4c1908634028fc9410feefa6b2179a6e5e5410f7545452e1ac4010d64ac1e5d31a3b7e2989ff30faecf") 03:34:39 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:39 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:39 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:39 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:39 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") [ 1356.162742] audit: type=1326 audit(2000000079.948:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8553 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 03:34:40 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000300)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[]}}, 0x0) 03:34:40 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$netlink(0x10, 0x3, 0x9) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[]}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 03:34:40 executing program 1: clone(0x20200, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004dc0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000004ec0)=0xe8) getresgid(&(0x7f0000004f00), &(0x7f0000004f40), &(0x7f0000004f80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005840)) geteuid() getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005880)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005980)=0xe8) getresgid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) stat(&(0x7f0000005b00)='./file0\x00', &(0x7f0000005b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005bc0)) fstat(0xffffffffffffffff, &(0x7f0000005c00)) lstat(&(0x7f0000005c80)='./file0\x00', &(0x7f0000005cc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005d80)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000005e80)=0xe8) getgroups(0x0, &(0x7f0000005ec0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005f00)) lstat(&(0x7f0000005f40)='./file0\x00', &(0x7f0000005f80)) fstat(0xffffffffffffffff, &(0x7f0000006000)) gettid() stat(&(0x7f0000007680)='./file0\x00', &(0x7f00000076c0)) stat(&(0x7f0000007740)='./file0/file0\x00', &(0x7f0000007780)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007800)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007840)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000007940)=0xe8) getgroups(0x0, &(0x7f0000007980)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008000), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:40 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r1 = dup(0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000200)=[{{r2, r3/1000+10000}, 0x3, 0x8000, 0xfffffffffffffff6}, {{}, 0x0, 0x73f, 0xd84}], 0x30) fsetxattr(r1, &(0x7f0000000280)=@known='com.apple.system.Security\x00', &(0x7f0000000440)='/dev/vcs\x00', 0x9, 0x0) r4 = dup3(0xffffffffffffffff, r1, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, 0xa013, r4, 0x0) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:40 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:40 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:40 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") [ 1357.039860] audit: type=1326 audit(2000000080.825:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8581 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 03:34:41 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:41 executing program 1: clone(0x20200, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004dc0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000004ec0)=0xe8) getresgid(&(0x7f0000004f00), &(0x7f0000004f40), &(0x7f0000004f80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005840)) geteuid() getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005880)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005980)=0xe8) getresgid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) stat(&(0x7f0000005b00)='./file0\x00', &(0x7f0000005b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005bc0)) fstat(0xffffffffffffffff, &(0x7f0000005c00)) lstat(&(0x7f0000005c80)='./file0\x00', &(0x7f0000005cc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005d80)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000005e80)=0xe8) getgroups(0x0, &(0x7f0000005ec0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005f00)) lstat(&(0x7f0000005f40)='./file0\x00', &(0x7f0000005f80)) fstat(0xffffffffffffffff, &(0x7f0000006000)) gettid() stat(&(0x7f0000007680)='./file0\x00', &(0x7f00000076c0)) stat(&(0x7f0000007740)='./file0/file0\x00', &(0x7f0000007780)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007800)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007840)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000007940)=0xe8) getgroups(0x0, &(0x7f0000007980)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008000), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:41 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:41 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x4000, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) alarm(0x200) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa081060}, 0xc, &(0x7f0000000280)={&(0x7f0000000440)={0x88, r1, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5c}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x4}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_team\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x27334b64}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x11}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7ff}]}, 0x88}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) r2 = dup(0xffffffffffffffff) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_open_dev$midi(&(0x7f0000000580)='/dev/midi#\x00', 0x100000000, 0x20001) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af12, &(0x7f0000000540)={0x0, 0x8dd}) r4 = socket$kcm(0x29, 0x2, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000000), 0x3) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") sendmsg$key(r2, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x2, 0x9, 0x100000000, 0x7, 0xe, 0x0, 0x70bd26, 0x25dfdbfb, [@sadb_lifetime={0x4, 0x3, 0xfc00000, 0x100000001, 0x4990}, @sadb_address={0x3, 0x7, 0x33, 0x20, 0x0, @in={0x2, 0x4e21}}, @sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_spirange={0x2, 0x10, 0x4d3, 0x4d6}, @sadb_x_sa2={0x2, 0x13, 0x6cd, 0x0, 0x0, 0x70bd25}]}, 0x70}}, 0x20040040) 03:34:41 executing program 4: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") [ 1357.925062] audit: type=1326 audit(2000000081.710:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8603 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572a9 code=0x0 03:34:41 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:41 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:42 executing program 1: clone(0x20200, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004dc0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000004ec0)=0xe8) getresgid(&(0x7f0000004f00), &(0x7f0000004f40), &(0x7f0000004f80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005840)) geteuid() getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005880)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005980)=0xe8) getresgid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) stat(&(0x7f0000005b00)='./file0\x00', &(0x7f0000005b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005bc0)) fstat(0xffffffffffffffff, &(0x7f0000005c00)) lstat(&(0x7f0000005c80)='./file0\x00', &(0x7f0000005cc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005d80)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000005e80)=0xe8) getgroups(0x0, &(0x7f0000005ec0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005f00)) lstat(&(0x7f0000005f40)='./file0\x00', &(0x7f0000005f80)) fstat(0xffffffffffffffff, &(0x7f0000006000)) gettid() stat(&(0x7f0000007680)='./file0\x00', &(0x7f00000076c0)) stat(&(0x7f0000007740)='./file0/file0\x00', &(0x7f0000007780)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007800)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007840)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000007940)=0xe8) getgroups(0x0, &(0x7f0000007980)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008000), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:42 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:42 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4c757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8240a140badd5c0150738039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a7def717d082626c6c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b3240") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r0 = dup(0xffffffffffffffff) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000040)={0x7, 0x3}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:42 executing program 4: epoll_create1(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a00)={&(0x7f00000009c0)='mime_type$%ppp0bdevGPLvmnet0vmnet0proc#{}trustedvmnet0\x00'}, 0x10) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000c00)=""/98) connect$unix(0xffffffffffffffff, &(0x7f0000000a40)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001340)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001380)={{{@in6=@remote, @in=@local}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000014c0)) getuid() lstat(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000015c0)) getuid() getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001600)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in=@rand_addr, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000001740)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002b80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002bc0)={{{@in6=@loopback, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000002cc0)=0xe8) stat(&(0x7f0000002d00)='./file0\x00', &(0x7f0000002d40)) gettid() lstat(&(0x7f0000002dc0)='./file0\x00', &(0x7f0000002e00)) lstat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002f40)) lstat(&(0x7f0000002f80)='./file0/file0\x00', &(0x7f0000002fc0)) fstat(0xffffffffffffffff, &(0x7f0000003040)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000030c0)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f00000031c0)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003980), &(0x7f00000039c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a00), &(0x7f0000003a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000003a80)='/dev/null\x00', 0x0, 0x0) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003ac0)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}}}, &(0x7f0000003bc0)=0xe8) getgid() gettid() lstat(&(0x7f0000003c00)='./file0\x00', &(0x7f0000003c40)) stat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004d00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004d40)={{{@in6=@loopback, @in=@local}}, {{}, 0x0, @in6}}, &(0x7f0000004e40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004e80), &(0x7f0000004ec0)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a450f6907c44379dfb9d6adbe90dfbbd89f7f") 03:34:42 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:42 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:43 executing program 1: clone(0x20200, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004dc0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000004ec0)=0xe8) getresgid(&(0x7f0000004f00), &(0x7f0000004f40), &(0x7f0000004f80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005840)) geteuid() getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005880)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005980)=0xe8) getresgid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) stat(&(0x7f0000005b00)='./file0\x00', &(0x7f0000005b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005bc0)) fstat(0xffffffffffffffff, &(0x7f0000005c00)) lstat(&(0x7f0000005c80)='./file0\x00', &(0x7f0000005cc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005d80)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000005e80)=0xe8) getgroups(0x0, &(0x7f0000005ec0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005f00)) lstat(&(0x7f0000005f40)='./file0\x00', &(0x7f0000005f80)) fstat(0xffffffffffffffff, &(0x7f0000006000)) gettid() stat(&(0x7f0000007680)='./file0\x00', &(0x7f00000076c0)) stat(&(0x7f0000007740)='./file0/file0\x00', &(0x7f0000007780)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007800)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007840)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000007940)=0xe8) getgroups(0x0, &(0x7f0000007980)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008000), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:43 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:43 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0x20000000009, 0xfffffffffffffffe, &(0x7f0000000040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000140)={{{@in=@dev}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000240)=0xe8) 03:34:43 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) dup2(r0, r0) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000440)={0x14, 0x88, 0xfa00, {r2, 0x10, 0x0, @in={0x2, 0x4e22, @multicast1}}}, 0x90) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:43 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0x20000000009, 0xfffffffffffffffe, &(0x7f0000000040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000140)={{{@in=@dev}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000240)=0xe8) 03:34:43 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:43 executing program 4: getpid() perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000140)="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", 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setitimer(0x0, &(0x7f00000003c0), &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}, 0x10) setitimer(0x0, &(0x7f0000000040)={{0x0, 0x7530}, {0x0, 0x2710}}, &(0x7f0000000140)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000280)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380)=0x4) inotify_rm_watch(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@loopback, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000ac0)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc) lstat(&(0x7f00000015c0)='./file0/file0\x00', &(0x7f0000001600)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001d00)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001d40)) getpgid(0xffffffffffffffff) getresuid(&(0x7f0000001dc0), &(0x7f0000001e00), &(0x7f0000001e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e80), &(0x7f0000001ec0)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001f00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f40)={{{@in=@local, @in=@multicast1}}, {{@in6=@ipv4}, 0x0, @in=@loopback}}, &(0x7f0000002040)=0xe8) getgroups(0x0, &(0x7f0000002080)) getpgrp(0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003480)) geteuid() fstat(0xffffffffffffffff, &(0x7f00000034c0)) gettid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000003540)) 03:34:43 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:44 executing program 1: clone(0x20200, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004dc0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000004ec0)=0xe8) getresgid(&(0x7f0000004f00), &(0x7f0000004f40), &(0x7f0000004f80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005840)) geteuid() getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005880)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005980)=0xe8) getresgid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) stat(&(0x7f0000005b00)='./file0\x00', &(0x7f0000005b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005bc0)) fstat(0xffffffffffffffff, &(0x7f0000005c00)) lstat(&(0x7f0000005c80)='./file0\x00', &(0x7f0000005cc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005d80)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000005e80)=0xe8) getgroups(0x0, &(0x7f0000005ec0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005f00)) lstat(&(0x7f0000005f40)='./file0\x00', &(0x7f0000005f80)) fstat(0xffffffffffffffff, &(0x7f0000006000)) gettid() stat(&(0x7f0000007680)='./file0\x00', &(0x7f00000076c0)) stat(&(0x7f0000007740)='./file0/file0\x00', &(0x7f0000007780)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007800)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007840)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000007940)=0xe8) getgroups(0x0, &(0x7f0000007980)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008000), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:34:44 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4c757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8240a140badd5c0150738039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a7def717d082626c6c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b3240") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000580)='/dev/nbd#\x00', 0x0, 0x2400) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r1 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000440)={{0x3, 0x3, 0x2, 0x3, 0x7f}, 0x419, 0xff, 0x3f}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='maps\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r3 = getpid() getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0xffffffffffffff7f}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000005c0)={r4, @in={{0x2, 0x4e20, @multicast2}}}, &(0x7f0000000680)=0x84) sched_setscheduler(r3, 0x5, &(0x7f0000000200)) writev(r2, &(0x7f0000001400), 0x0) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0xc) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f00000004c0)={0xff, {0x2, 0x4e20, @remote}, {0x2, 0x4e20, @rand_addr=0x200}, {0x2, 0x4e24, @broadcast}, 0x0, 0x5c6, 0x1b, 0x2, 0xa9, 0x0, 0xffffffff, 0x20, 0x3}) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000040)) sched_setscheduler(r3, 0x3, &(0x7f00000006c0)=0x8) seccomp(0x0, 0x1, &(0x7f0000000280)={0x2, &(0x7f0000000200)=[{0x2f89, 0x401, 0x1ff, 0x1f}, {0xffffffff935cc4ff, 0x9a, 0x404, 0x7fff}]}) seccomp(0x1, 0x40000, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:44 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:44 executing program 1: clone(0x20200, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004dc0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000004ec0)=0xe8) getresgid(&(0x7f0000004f00), &(0x7f0000004f40), &(0x7f0000004f80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005840)) geteuid() getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005880)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005980)=0xe8) getresgid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) stat(&(0x7f0000005b00)='./file0\x00', &(0x7f0000005b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005bc0)) fstat(0xffffffffffffffff, &(0x7f0000005c00)) lstat(&(0x7f0000005c80)='./file0\x00', &(0x7f0000005cc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005d80)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000005e80)=0xe8) getgroups(0x0, &(0x7f0000005ec0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005f00)) lstat(&(0x7f0000005f40)='./file0\x00', &(0x7f0000005f80)) fstat(0xffffffffffffffff, &(0x7f0000006000)) gettid() stat(&(0x7f0000007680)='./file0\x00', &(0x7f00000076c0)) stat(&(0x7f0000007740)='./file0/file0\x00', &(0x7f0000007780)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007800)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007840)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000007940)=0xe8) getgroups(0x0, &(0x7f0000007980)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008000), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:34:44 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4c757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8240a140badd5c0150738039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a7def717d082626c6c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b3240") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r1 = dup(0xffffffffffffffff) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x9) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") fcntl$getownex(r0, 0x10, &(0x7f0000000040)) 03:34:44 executing program 1: clone(0x20200, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004dc0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000004ec0)=0xe8) getresgid(&(0x7f0000004f00), &(0x7f0000004f40), &(0x7f0000004f80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005840)) geteuid() getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005880)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005980)=0xe8) getresgid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) stat(&(0x7f0000005b00)='./file0\x00', &(0x7f0000005b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005bc0)) fstat(0xffffffffffffffff, &(0x7f0000005c00)) lstat(&(0x7f0000005c80)='./file0\x00', &(0x7f0000005cc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005d80)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000005e80)=0xe8) getgroups(0x0, &(0x7f0000005ec0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005f00)) lstat(&(0x7f0000005f40)='./file0\x00', &(0x7f0000005f80)) fstat(0xffffffffffffffff, &(0x7f0000006000)) gettid() stat(&(0x7f0000007680)='./file0\x00', &(0x7f00000076c0)) stat(&(0x7f0000007740)='./file0/file0\x00', &(0x7f0000007780)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007800)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007840)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000007940)=0xe8) getgroups(0x0, &(0x7f0000007980)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008000), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:34:44 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) getresuid(&(0x7f0000000040), &(0x7f0000000200), &(0x7f0000000280)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) write$FUSE_ENTRY(r1, &(0x7f00000004c0)={0x90, 0xfffffffffffffff5, 0x4, {0x0, 0x2, 0x9, 0xa, 0x5, 0xffffffff, {0x1, 0x7edc, 0x2, 0x1ff, 0x0, 0x5, 0x7, 0x5, 0x4, 0x8, 0x4, r2, r3, 0x1f, 0xfffffffffffff001}}}, 0x90) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) r4 = msgget(0x2, 0x7) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000005c0)) msgctl$MSG_STAT(r4, 0xb, &(0x7f0000000580)=""/42) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0690fef69dcceeeff0f1837f2ad0f382193c4c19086d9f28f410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:44 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:44 executing program 1: clone(0x20200, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004dc0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000004ec0)=0xe8) getresgid(&(0x7f0000004f00), &(0x7f0000004f40), &(0x7f0000004f80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005840)) geteuid() getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005880)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005980)=0xe8) getresgid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) stat(&(0x7f0000005b00)='./file0\x00', &(0x7f0000005b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005bc0)) fstat(0xffffffffffffffff, &(0x7f0000005c00)) lstat(&(0x7f0000005c80)='./file0\x00', &(0x7f0000005cc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005d80)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000005e80)=0xe8) getgroups(0x0, &(0x7f0000005ec0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005f00)) lstat(&(0x7f0000005f40)='./file0\x00', &(0x7f0000005f80)) fstat(0xffffffffffffffff, &(0x7f0000006000)) gettid() stat(&(0x7f0000007680)='./file0\x00', &(0x7f00000076c0)) stat(&(0x7f0000007740)='./file0/file0\x00', &(0x7f0000007780)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007800)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007840)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000007940)=0xe8) getgroups(0x0, &(0x7f0000007980)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008000), 0x0, 0x0) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:44 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r1 = dup(0xffffffffffffffff) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x9) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") fcntl$getownex(r0, 0x10, &(0x7f0000000040)) 03:34:44 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:44 executing program 1: clone(0x20200, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004dc0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000004ec0)=0xe8) getresgid(&(0x7f0000004f00), &(0x7f0000004f40), &(0x7f0000004f80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005840)) geteuid() getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005880)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005980)=0xe8) getresgid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) stat(&(0x7f0000005b00)='./file0\x00', &(0x7f0000005b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005bc0)) fstat(0xffffffffffffffff, &(0x7f0000005c00)) lstat(&(0x7f0000005c80)='./file0\x00', &(0x7f0000005cc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005d80)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000005e80)=0xe8) getgroups(0x0, &(0x7f0000005ec0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005f00)) lstat(&(0x7f0000005f40)='./file0\x00', &(0x7f0000005f80)) fstat(0xffffffffffffffff, &(0x7f0000006000)) gettid() stat(&(0x7f0000007680)='./file0\x00', &(0x7f00000076c0)) stat(&(0x7f0000007740)='./file0/file0\x00', &(0x7f0000007780)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007800)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007840)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000007940)=0xe8) getgroups(0x0, &(0x7f0000007980)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008000), 0x0, 0x0) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:44 executing program 1: clone(0x20200, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004dc0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000004ec0)=0xe8) getresgid(&(0x7f0000004f00), &(0x7f0000004f40), &(0x7f0000004f80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005840)) geteuid() getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005880)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005980)=0xe8) getresgid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) stat(&(0x7f0000005b00)='./file0\x00', &(0x7f0000005b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005bc0)) fstat(0xffffffffffffffff, &(0x7f0000005c00)) lstat(&(0x7f0000005c80)='./file0\x00', &(0x7f0000005cc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005d80)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000005e80)=0xe8) getgroups(0x0, &(0x7f0000005ec0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005f00)) lstat(&(0x7f0000005f40)='./file0\x00', &(0x7f0000005f80)) fstat(0xffffffffffffffff, &(0x7f0000006000)) gettid() stat(&(0x7f0000007680)='./file0\x00', &(0x7f00000076c0)) stat(&(0x7f0000007740)='./file0/file0\x00', &(0x7f0000007780)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007800)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007840)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000007940)=0xe8) getgroups(0x0, &(0x7f0000007980)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008000), 0x0, 0x0) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:44 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r1 = dup(0xffffffffffffffff) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x9) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") fcntl$getownex(r0, 0x10, &(0x7f0000000040)) 03:34:45 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:45 executing program 1: clone(0x20200, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004dc0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000004ec0)=0xe8) getresgid(&(0x7f0000004f00), &(0x7f0000004f40), &(0x7f0000004f80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005840)) geteuid() getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005880)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005980)=0xe8) getresgid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) stat(&(0x7f0000005b00)='./file0\x00', &(0x7f0000005b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005bc0)) fstat(0xffffffffffffffff, &(0x7f0000005c00)) lstat(&(0x7f0000005c80)='./file0\x00', &(0x7f0000005cc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005d80)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000005e80)=0xe8) getgroups(0x0, &(0x7f0000005ec0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005f00)) lstat(&(0x7f0000005f40)='./file0\x00', &(0x7f0000005f80)) fstat(0xffffffffffffffff, &(0x7f0000006000)) gettid() stat(&(0x7f0000007680)='./file0\x00', &(0x7f00000076c0)) stat(&(0x7f0000007740)='./file0/file0\x00', &(0x7f0000007780)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007800)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007840)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000007940)=0xe8) getgroups(0x0, &(0x7f0000007980)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:45 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r1 = dup(0xffffffffffffffff) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x9) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:45 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:45 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x200000) sendmsg$inet_sctp(r0, &(0x7f0000000680)={&(0x7f0000000080)=@in={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000280)="b35af53d8e1164ee1ba762b2a8405054", 0x10}, {&(0x7f0000000540)="aa8766868663cd1eb0a12a24d73e449793483e6445614d8df53b7701dd13809e036527ed3a378c9b2715831252df3c606853b079ace34d27d89a46e4f2d239bc3fc17ca86fb7132fe8128512c15065f2ea2aacaf961bce9fac660ccee3e56cd3d8400d7ff9e34a813d73c5ec9b36d665ecdeeb96907bc816b477bf5f3498670b4a81bbf62123d591b08c03eefffe9c9a8395df095b9e0045efe4368b2c458831c8cc6da4a126e7392c19ea1ce23735f4d6e9cccfb62890dca96d8bb9d9dc914f43973af3de9c4e3215f842ae0cb1698f8e6953", 0xd3}], 0x2, 0x0, 0x0, 0x800}, 0x1) pread64(r0, &(0x7f00000006c0)=""/3, 0x3, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x3d, &(0x7f00000007c0)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_dccp_buf(r1, 0x21, 0x2, &(0x7f0000000440)="a08652ace682f0ecb7c06370d9c556655744d48bd75ae492395b485ec40ea7ae14f12e60a5e28ae1ff6fef4930cb1b6d6276b3da69036a976b69c67dab75452e787cd63dc49f2111b7d4b1c002bbb55188ca1e6efd043839941b616b7d7b3213f64dc169d6d4021d23d5e173eca4ab93189dbcd652dcba983b8c55902bb787f9791bef05469ed93806bf2c8d3df58144ce5123a5bbd0a4c5eadb001ba52c8ad0f3fe452309c1a2cc7801a590cb333073ae3693e6d4d44f510abac616034de82c3c4766d11d680e91fcb99ee26739700e89d66c7408cb065f17b9484b841ff52590646e6a6aa8589f5ed28d5699128da7ab34b50dfee8bf", 0xf7) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") poll(&(0x7f0000000040)=[{r0, 0x2000}, {r1, 0x1000}, {r1, 0x4}, {r2}, {r2, 0x4}, {r1, 0x48}, {r2, 0x402}], 0x7, 0x100000001) 03:34:45 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:45 executing program 1: clone(0x20200, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004dc0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000004ec0)=0xe8) getresgid(&(0x7f0000004f00), &(0x7f0000004f40), &(0x7f0000004f80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005840)) geteuid() getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005880)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005980)=0xe8) getresgid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) stat(&(0x7f0000005b00)='./file0\x00', &(0x7f0000005b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005bc0)) fstat(0xffffffffffffffff, &(0x7f0000005c00)) lstat(&(0x7f0000005c80)='./file0\x00', &(0x7f0000005cc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005d80)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000005e80)=0xe8) getgroups(0x0, &(0x7f0000005ec0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005f00)) lstat(&(0x7f0000005f40)='./file0\x00', &(0x7f0000005f80)) fstat(0xffffffffffffffff, &(0x7f0000006000)) gettid() stat(&(0x7f0000007680)='./file0\x00', &(0x7f00000076c0)) stat(&(0x7f0000007740)='./file0/file0\x00', &(0x7f0000007780)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007800)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007840)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000007940)=0xe8) getgroups(0x0, &(0x7f0000007980)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:45 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r1 = dup(0xffffffffffffffff) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x9) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 03:34:45 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001400)) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:46 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x9) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:34:46 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4c757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8240a140badd5c0150738039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a7def717d082626c6c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b3240") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x9) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) 03:34:46 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:46 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x9) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:34:46 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) r0 = dup(0xffffffffffffffff) r1 = dup3(r0, r0, 0x200000000000) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x80000001, 0x4) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:46 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:46 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) dup(0xffffffffffffffff) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x9) 03:34:46 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180), 0x18) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x9) 03:34:46 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x9) 03:34:46 executing program 1: clone(0x20200, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004dc0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000004ec0)=0xe8) getresgid(&(0x7f0000004f00), &(0x7f0000004f40), &(0x7f0000004f80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005840)) geteuid() getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005880)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005980)=0xe8) getresgid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) stat(&(0x7f0000005b00)='./file0\x00', &(0x7f0000005b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005bc0)) fstat(0xffffffffffffffff, &(0x7f0000005c00)) lstat(&(0x7f0000005c80)='./file0\x00', &(0x7f0000005cc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005d80)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000005e80)=0xe8) getgroups(0x0, &(0x7f0000005ec0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005f00)) lstat(&(0x7f0000005f40)='./file0\x00', &(0x7f0000005f80)) fstat(0xffffffffffffffff, &(0x7f0000006000)) gettid() stat(&(0x7f0000007680)='./file0\x00', &(0x7f00000076c0)) stat(&(0x7f0000007740)='./file0/file0\x00', &(0x7f0000007780)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007800)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007840)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000007940)=0xe8) getgroups(0x0, &(0x7f0000007980)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:46 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x9) 03:34:46 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:46 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4c757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8240a140badd5c0150738039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a7def717d082626c6c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b3240") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x9) 03:34:47 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x9) 03:34:47 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:47 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="32047cc8ae66805fa2e93e4192c1ee9913949588d1f91a719dd622d3e7efd8c56f08deb98098e534bff724d8b92da4c757c42b8066075b6c82064acb4d8beda08527250786dadbd8241bf1f9f55a4cd28f8240a140badd5c0150738039443b1fdf5edebd7149a7edf77ad21560d28ebd150e1f561b272e4c450063e27f37da5e3f6f5d6bfbd78b3ba4ac0d196fa6a87493f5fd49d8a17df0191a7def717d082626c6c5b86cad18b84a603516c3cc0814d71e81d62c1c0206d128c75bf314833e32cfce3ae9e82d5c0915cfff9adbdc469635751b4e0690c3942dfcbc8423f3fa253142fc7ffb334d49958533d4c2e12b3ffd681e838e64d5d40a35729b7b3240") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x9) 03:34:47 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000140)) write$input_event(0xffffffffffffffff, &(0x7f0000000180)={{0x77359400}}, 0x18) dup(0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0690fef69dc0f01eece41ff0f1837370f382193c4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:47 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x9) 03:34:47 executing program 0: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0xffffffffffffffff) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)=')vboxnet1userlosystem\x00'}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getgid() bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340), 0x4) fchownat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x2, 0x0, @remote}, &(0x7f0000000d00)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:34:47 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x9) 03:34:47 executing program 4: r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x9) 03:34:47 executing program 1: clone(0x20200, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0xff}, 0x28, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) getgroups(0x0, &(0x7f0000002900)) getpid() getuid() getresgid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002b40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getuid() stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004240)={{{@in=@loopback, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000004340)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004380)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004980)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) geteuid() getgid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004d40)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004dc0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000004ec0)=0xe8) getresgid(&(0x7f0000004f00), &(0x7f0000004f40), &(0x7f0000004f80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005840)) geteuid() getgid() getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005880)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005980)=0xe8) getresgid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) stat(&(0x7f0000005b00)='./file0\x00', &(0x7f0000005b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005bc0)) fstat(0xffffffffffffffff, &(0x7f0000005c00)) lstat(&(0x7f0000005c80)='./file0\x00', &(0x7f0000005cc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005d80)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000005e80)=0xe8) getgroups(0x0, &(0x7f0000005ec0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005f00)) lstat(&(0x7f0000005f40)='./file0\x00', &(0x7f0000005f80)) fstat(0xffffffffffffffff, &(0x7f0000006000)) gettid() stat(&(0x7f0000007680)='./file0\x00', &(0x7f00000076c0)) stat(&(0x7f0000007740)='./file0/file0\x00', &(0x7f0000007780)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007800)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007840)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000007940)=0xe8) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008000), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:34:47 executing program 4: syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x9) 03:34:47 executing program 2: recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") getuid() getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) getresuid(&(0x7f0000000d40), &(0x7f00000012c0), &(0x7f0000000bc0)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000001500)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000b80)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000001640)) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000002c00)) stat(&(0x7f0000001780)='./file0\x00', &(0x7f0000002c80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f0000000500)=@proc, 0xc, &(0x7f0000001240), 0x0, &(0x7f0000002d00)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @broadcast}, &(0x7f00000001c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x10098) getsockname(0xffffffffffffffff, &(0x7f0000000840)=@hci, &(0x7f00000008c0)=0x80) accept(0xffffffffffffffff, &(0x7f0000000900)=@xdp, &(0x7f0000000980)=0x72) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'syz_tun\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@local, @in6=@mcast2}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000040), 0xc, &(0x7f0000001340)={&(0x7f0000001a40)=ANY=[]}}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) 03:34:47 executing program 4: r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x0) [ 1364.092172] divide error: 0000 [#1] SMP KASAN [ 1364.096738] CPU: 0 PID: 8825 Comm: syz-executor4 Not tainted 4.19.0-rc2-next-20180904+ #55 [ 1364.105175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1364.114687] RIP: 0010:nbd_ioctl+0x53c/0xcf0 [ 1364.119047] Code: ea 03 80 3c 02 00 0f 85 1c 07 00 00 48 8b b5 c0 fe ff ff 48 63 8d b8 fe ff ff 48 8b 86 c8 00 00 00 48 8d be c0 00 00 00 48 99 <48> f7 f9 48 ba 00 00 00 00 00 fc ff df 48 89 f9 48 c1 e9 03 80 3c [ 1364.138002] RSP: 0018:ffff88018525f828 EFLAGS: 00010246 [ 1364.143493] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000 [ 1364.150794] RDX: 0000000000000000 RSI: ffff8801d101fd00 RDI: ffff8801d101fdc0 [ 1364.158083] RBP: ffff88018525f9a0 R08: ffff8801ce894240 R09: ffffed003a9582d5 [ 1364.165459] R10: ffff88018525f818 R11: ffff8801d4ac16af R12: ffff8801d4ac15c0 [ 1364.172750] R13: 00000000ffffffe7 R14: ffff8801d4ac16a0 R15: ffff88017548f600 [ 1364.180045] FS: 00007f29fd87b700(0000) GS:ffff8801db000000(0000) knlGS:0000000000000000 [ 1364.188301] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1364.194227] CR2: 00000000007210a4 CR3: 00000001d8a03000 CR4: 00000000001406f0 [ 1364.201528] Call Trace: [ 1364.204162] ? nbd_release+0x140/0x140 [ 1364.208081] ? graph_lock+0x170/0x170 [ 1364.211910] ? do_futex+0x249/0x27d0 [ 1364.215685] ? rcu_is_watching+0x8c/0x150 [ 1364.219851] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 1364.224569] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 1364.229278] ? find_held_lock+0x36/0x1c0 [ 1364.233374] ? nbd_release+0x140/0x140 [ 1364.237381] blkdev_ioctl+0x9cd/0x2030 [ 1364.241310] ? blkpg_ioctl+0xc40/0xc40 [ 1364.245266] ? kasan_check_read+0x11/0x20 [ 1364.249533] ? rcu_is_watching+0x8c/0x150 [ 1364.253732] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 1364.258446] ? __fget+0x4d5/0x740 [ 1364.261932] ? ksys_dup3+0x690/0x690 [ 1364.265710] ? trace_hardirqs_on+0x2c0/0x2c0 [ 1364.270154] ? kasan_check_write+0x14/0x20 [ 1364.274514] block_ioctl+0xee/0x130 [ 1364.278167] ? blkdev_fallocate+0x400/0x400 [ 1364.282524] do_vfs_ioctl+0x1de/0x1720 [ 1364.286442] ? kasan_check_read+0x11/0x20 [ 1364.290706] ? rcu_is_watching+0x8c/0x150 [ 1364.294882] ? trace_hardirqs_on+0xbd/0x2c0 [ 1364.299240] ? ioctl_preallocate+0x300/0x300 [ 1364.303673] ? __fget_light+0x2f7/0x440 [ 1364.307668] ? putname+0xf2/0x130 [ 1364.311141] ? fget_raw+0x20/0x20 [ 1364.314616] ? rcu_read_lock_sched_held+0x108/0x120 [ 1364.319743] ? __x64_sys_futex+0x47f/0x6a0 [ 1364.324015] ? do_syscall_64+0x9a/0x820 [ 1364.328010] ? do_syscall_64+0x9a/0x820 [ 1364.332006] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1364.336606] ? security_file_ioctl+0x94/0xc0 [ 1364.341033] ksys_ioctl+0xa9/0xd0 [ 1364.344516] __x64_sys_ioctl+0x73/0xb0 [ 1364.348498] do_syscall_64+0x1b9/0x820 [ 1364.352406] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1364.357803] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1364.362757] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 1364.367803] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1364.373015] ? recalc_sigpending_tsk+0x180/0x180 [ 1364.377790] ? kasan_check_write+0x14/0x20 [ 1364.382050] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1364.386917] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1364.392334] RIP: 0033:0x4572a9 [ 1364.395544] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1364.414683] RSP: 002b:00007f29fd87ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1364.422511] RAX: ffffffffffffffda RBX: 00007f29fd87b6d4 RCX: 00000000004572a9 [ 1364.429858] RDX: 0000000000000000 RSI: 000000000000ab01 RDI: 0000000000000003 [ 1364.437155] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 1364.444452] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1364.451819] R13: 00000000004cff50 R14: 00000000004c60f7 R15: 0000000000000000 [ 1364.459235] Modules linked in: [ 1364.462499] Dumping ftrace buffer: [ 1364.466122] (ftrace buffer empty) [ 1364.470089] ---[ end trace 6edb90da00aa4bc5 ]--- [ 1364.474916] RIP: 0010:nbd_ioctl+0x53c/0xcf0 [ 1364.479327] Code: ea 03 80 3c 02 00 0f 85 1c 07 00 00 48 8b b5 c0 fe ff ff 48 63 8d b8 fe ff ff 48 8b 86 c8 00 00 00 48 8d be c0 00 00 00 48 99 <48> f7 f9 48 ba 00 00 00 00 00 fc ff df 48 89 f9 48 c1 e9 03 80 3c [ 1364.498508] RSP: 0018:ffff88018525f828 EFLAGS: 00010246 [ 1364.504088] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000 [ 1364.511411] RDX: 0000000000000000 RSI: ffff8801d101fd00 RDI: ffff8801d101fdc0 [ 1364.518840] RBP: ffff88018525f9a0 R08: ffff8801ce894240 R09: ffffed003a9582d5 [ 1364.526158] R10: ffff88018525f818 R11: ffff8801d4ac16af R12: ffff8801d4ac15c0 [ 1364.533500] R13: 00000000ffffffe7 R14: ffff8801d4ac16a0 R15: ffff88017548f600 [ 1364.540821] FS: 00007f29fd87b700(0000) GS:ffff8801db000000(0000) knlGS:0000000000000000 [ 1364.549093] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1364.555024] CR2: 00000000007210a4 CR3: 00000001d8a03000 CR4: 00000000001406f0 [ 1364.562336] Kernel panic - not syncing: Fatal exception [ 1364.568293] Dumping ftrace buffer: [ 1364.571924] (ftrace buffer empty) [ 1364.575659] Kernel Offset: disabled [ 1364.579286] Rebooting in 86400 seconds..