0)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:05 executing program 3: eventfd(0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000400)) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) futex(&(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000300)={0x0, 0x989680}, &(0x7f00000003c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000440), 0x0) signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000500)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@multicast1, @multicast2}, &(0x7f00000006c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@mcast1}, &(0x7f0000000800)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@dev, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@multicast1}}, &(0x7f0000000a00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000700)=0xfffffffffffffdbb) getsockname$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000bc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'bpq0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in=@remote, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000d40)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000011c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001280)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000012c0)={{{@in=@rand_addr, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f00000013c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001400)={{{@in=@multicast1, @in6}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000001500)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001540)={{{@in, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000001640)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001680)={{{@in=@dev, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000001780)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000017c0)={{{@in6, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f00000018c0)=0xe8) syz_execute_func(&(0x7f0000000600)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 12:47:05 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:05 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000001680)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0ce6969ef69dc00d990c841ff0f183fc413197c2a060f38da211a66460f3a0f4d00baf28fc9410feefa4175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 12:47:06 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={"626f6e643000000001feffff00"}) 12:47:06 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:06 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:06 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000001680)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0ce6969ef69dc00d990c841ff0f183fc413197c2a060f38da211a66460f3a0f4d00baf28fc9410feefa4175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 12:47:06 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:07 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000200)=0xfffffffffffffffe, 0x4) 12:47:07 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 12:47:07 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:07 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:07 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x10b}, 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x10b}, 0x1c) 12:47:07 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000001680)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0ce6969ef69dc00d990c841ff0f183fc413197c2a060f38da211a66460f3a0f4d00baf28fc9410feefa4175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 12:47:07 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 12:47:07 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:07 executing program 3: r0 = gettid() clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x1f, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a9, 0x1, 0xc1f, 0x8, 0x100000001, 0x4, 0x3ff, 0x8, 0x0, 0x86, 0x0, 0x3, 0x100000001, 0x8, 0x1000, 0x2, 0x80000001, 0x80, 0xffff, 0x20, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000140), 0x8}, 0x24000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7}, r0, 0x1, 0xffffffffffffffff, 0x8) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setpgid(r0, 0x0) 12:47:07 executing program 3: eventfd(0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000400)) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) futex(&(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000300)={0x0, 0x989680}, &(0x7f00000003c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000440), 0x0) signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000500)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@multicast1, @multicast2}, &(0x7f00000006c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@mcast1}, &(0x7f0000000800)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@dev, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@multicast1}}, &(0x7f0000000a00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000700)=0xfffffffffffffdbb) getsockname$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000bc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'bpq0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in=@remote, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000d40)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000011c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001280)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000012c0)={{{@in=@rand_addr, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f00000013c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001400)={{{@in=@multicast1, @in6}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000001500)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001540)={{{@in, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000001640)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001680)={{{@in=@dev, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000001780)=0xe8) syz_execute_func(&(0x7f0000000600)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 12:47:08 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 12:47:08 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:08 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:08 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000001680)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0ce6969ef69dc00d990c841ff0f183fc413197c2a060f38da211a66460f3a0f4d00baf28fc9410feefa4175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 12:47:08 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:08 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 12:47:09 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:09 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000002c0)="c1f5ead9551cb66ecbd2f532e6ea1a166f6c8b99922f389ca1b7063f542a3cfbef6e9483f0c3929599f27911fb5fab655b8569bd4eeef8dcf57c4d1bca64a2acf21b19499c0334add077e41f59fcfaeef0cb3086e0b2113ad223126d5c152d5af5a760d1e0ee018f62ccce615d5884e34021bd07c4361dcd4fd5383ff835cc01a09c6e58b2f9e707f36860a850d4a9f4330da4e7c67c5169bb341a1c9befe4a8fe7d442924f6e8e17a18e18080e866549a0520", 0xb3, 0x4000000, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @mcast1, 0x2000000000300000}, 0x1c) 12:47:09 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:09 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000001680)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50fe4}]}) 12:47:09 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0)='bond0\x00', 0x10) 12:47:09 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:09 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000001680)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50fe4}]}) 12:47:09 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000619fcd3823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f0004000000000000000000000000"], 0x90) 12:47:09 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000001680)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50fe4}]}) 12:47:09 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000680)="428055a0ce6969ef69dc00d990c841ff0f183fc413197c2a060f38da211a66460f3a0f4d00baf28fc9410feefa4175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 12:47:09 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000619fcd3823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f0004000000000000000000000000"], 0x90) 12:47:09 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 12:47:10 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:10 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000680)="428055a0ce6969ef69dc00d990c841ff0f183fc413197c2a060f38da211a66460f3a0f4d00baf28fc9410feefa4175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 12:47:10 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:10 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000619fcd3823b7c94f5a3276ce8c9461000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f0004000000000000000000000000"], 0x90) 12:47:10 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000680)="428055a0ce6969ef69dc00d990c841ff0f183fc413197c2a060f38da211a66460f3a0f4d00baf28fc9410feefa4175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 12:47:10 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:10 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000001680)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0ce6969ef69dc00d990c841ff0f183fc413197c2a060f38da211a66460f3a0f4d00baf28fc9410feefa4175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 12:47:10 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000001680)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0ce6969ef69dc00d990c841ff0f183fc413197c2a060f38da211a66460f3a0f4d00baf28fc9410feefa4175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 12:47:10 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000001680)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0ce6969ef69dc00d990c841ff0f183fc413197c2a060f38da211a66460f3a0f4d00baf28fc9410feefa4175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 12:47:10 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000001680)) syz_execute_func(&(0x7f0000000680)="428055a0ce6969ef69dc00d990c841ff0f183fc413197c2a060f38da211a66460f3a0f4d00baf28fc9410feefa4175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 12:47:10 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000001680)) syz_execute_func(&(0x7f0000000680)="428055a0ce6969ef69dc00d990c841ff0f183fc413197c2a060f38da211a66460f3a0f4d00baf28fc9410feefa4175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 12:47:10 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 12:47:10 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:10 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000001680)) syz_execute_func(&(0x7f0000000680)="428055a0ce6969ef69dc00d990c841ff0f183fc413197c2a060f38da211a66460f3a0f4d00baf28fc9410feefa4175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 12:47:10 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 12:47:11 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080), 0x1c) 12:47:11 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:11 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:11 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000001680)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0ce6969ef69dc00d990c841ff0f183fc413197c2a060f38da211a66460f3a0f4d00baf28fc9410feefa4175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 12:47:11 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 12:47:11 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000001680)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0ce6969ef69dc00d990c841ff0f183fc413197c2a060f38da211a66460f3a0f4d00baf28fc9410feefa4175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 12:47:11 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001}, 0x2c) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 12:47:11 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000001680)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0ce6969ef69dc00d990c841ff0f183fc413197c2a060f38da211a66460f3a0f4d00baf28fc9410feefa4175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 12:47:11 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001}, 0x2c) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 12:47:11 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') readv(r0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/187, 0xbb}, {&(0x7f0000000140)=""/58, 0x3a}], 0x2) 12:47:11 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000001680)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000680)="428055a0ce6969ef69dc00d990c841ff0f183fc413197c2a060f38da211a66460f3a0f4d00baf28fc9410feefa4175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 12:47:11 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001}, 0x2c) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 12:47:11 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:11 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) [ 1434.892115] audit: type=1326 audit(1537015631.955:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12181 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 12:47:12 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:12 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0xc, 0x2009, 0x20000000000001}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 12:47:12 executing program 3: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:47:12 executing program 3: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:12 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:12 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:12 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:12 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000001680)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000680)="428055a0ce6969ef69dc00d990c841ff0f183fc413197c2a060f38da211a66460f3a0f4d00baf28fc9410feefa4175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 12:47:12 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:12 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x0, 0x2009, 0x20000000000001}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") [ 1435.784748] audit: type=1326 audit(1537015632.855:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12213 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 12:47:12 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:12 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:13 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:13 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000011000), 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)}, 0x20) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000000c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000140)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@multicast1, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x0, &(0x7f0000000540)) getgroups(0x0, &(0x7f0000000580)) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe(&(0x7f0000000240)) futimesat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={{0x77359400}, {0x0, 0x2710}}) inotify_init1(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) socket$packet(0x11, 0x0, 0x300) dup(0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000540)={0x0, &(0x7f0000000300)}) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000380), 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 12:47:13 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000001680)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000680)="428055a0ce6969ef69dc00d990c841ff0f183fc413197c2a060f38da211a66460f3a0f4d00baf28fc9410feefa4175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 12:47:13 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) [ 1436.714881] audit: type=1326 audit(1537015633.785:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12245 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 12:47:13 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x0, 0x20000000000001}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 12:47:13 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:13 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0xfdef, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x2c000000}, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x7e}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 12:47:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0xfdef, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x2c000000}, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x7e}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 12:47:14 executing program 0: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x0) shmdt(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000140), 0xfffffffffffffeae) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000300)=0x14) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d990c84164ff0fe20fe2370f38211ac4c19086d9f28fc9410feefac1fb4175450f2e1a1a010274ecc54ff3d02ff3d02f2fe2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/rpc\x00') shmdt(0x0) keyctl$set_reqkey_keyring(0x10, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000480)) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffd) getresgid(&(0x7f00000004c0), &(0x7f0000000540), &(0x7f0000000580)) add_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380), &(0x7f00000007c0), 0x0, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000001c0), &(0x7f0000000700)='team0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f0000000440)) getcwd(&(0x7f0000000740)=""/243, 0xf3) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f00000003c0)={0xf}, 0xf) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_LOCK(0x0, 0xb) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)=""/122, &(0x7f0000000200)=0x7a) openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000280), &(0x7f00000002c0)) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f0000000180)) timer_delete(0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) 12:47:14 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) syz_emit_ethernet(0xfdef, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x2c000000}, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "093a06", 0x8, 0x3a, 0x0, @remote={0xfe, 0x7e}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 12:47:14 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 12:47:14 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:14 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000100)={@link_local={0x1, 0x80, 0xc2, 0x3a000000}, @remote, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty, {[@generic={0x0, 0xc, "ede31c5d8e5b2510afc3"}]}}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, &(0x7f0000000040)) 12:47:14 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:14 executing program 3: clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') sched_setscheduler(r0, 0x5, &(0x7f0000000140)) renameat(r1, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00') 12:47:15 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f00000003c0)={&(0x7f0000000240)={0x14}, 0x14}}, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) fchmod(0xffffffffffffffff, 0x0) getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000440)) dup(0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0) prctl$void(0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) init_module(&(0x7f0000000300)='/dev/rtc0\x00', 0xa, &(0x7f0000000340)=',ppp1\x00') openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000004c0)=0x14, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 12:47:15 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x400, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$LOOP_CHANGE_FD(r0, 0x125f, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)="637075616363742e73746174602cfbff975c4d8d30d1243ccb343b9db51c2f2f22b444c6297913d09b67c5a755cef966cc0c05fba03f3fbe8974240999f48b4c38100e0965216510f3d28cbd9f8551b8ee57d0a5bd9a3bdb43411c9cbee957843dfd148e7b6eca0df81b532b75d3b4251ce0e7a5b7c55487c676cb027848fa9fe047a768cb69beb0e450ce69c1a6e382101f057f58dde4b09f483cdc45703902553ac673c1f1269e110094d3b3d259aa084eedd0159fab124ddb4a6fb1900d1e33394b51200ea2bf02565836293973fc1cf2fcf210e9b8", 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000380)={'icmp6\x00'}, &(0x7f00000003c0)=0x1e) 12:47:15 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x400, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$LOOP_CHANGE_FD(r0, 0x125f, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)="637075616363742e73746174602cfbff975c4d8d30d1243ccb343b9db51c2f2f22b444c6297913d09b67c5a755cef966cc0c05fba03f3fbe8974240999f48b4c38100e0965216510f3d28cbd9f8551b8ee57d0a5bd9a3bdb43411c9cbee957843dfd148e7b6eca0df81b532b75d3b4251ce0e7a5b7c55487c676cb027848fa9fe047a768cb69beb0e450ce69c1a6e382101f057f58dde4b09f483cdc45703902553ac673c1f1269e110094d3b3d259aa084eedd0159fab124ddb4a6fb1900d1e33394b51200ea2bf02565836293973fc1cf2fcf210e9b8", 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000380)={'icmp6\x00'}, &(0x7f00000003c0)=0x1e) 12:47:15 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001}, 0x2c) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 12:47:15 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:15 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x400, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$LOOP_CHANGE_FD(r0, 0x125f, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)="637075616363742e73746174602cfbff975c4d8d30d1243ccb343b9db51c2f2f22b444c6297913d09b67c5a755cef966cc0c05fba03f3fbe8974240999f48b4c38100e0965216510f3d28cbd9f8551b8ee57d0a5bd9a3bdb43411c9cbee957843dfd148e7b6eca0df81b532b75d3b4251ce0e7a5b7c55487c676cb027848fa9fe047a768cb69beb0e450ce69c1a6e382101f057f58dde4b09f483cdc45703902553ac673c1f1269e110094d3b3d259aa084eedd0159fab124ddb4a6fb1900d1e33394b51200ea2bf02565836293973fc1cf2fcf210e9b8", 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000380)={'icmp6\x00'}, &(0x7f00000003c0)=0x1e) 12:47:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001}, 0x2c) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 12:47:15 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:15 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x400, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$LOOP_CHANGE_FD(r0, 0x125f, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)="637075616363742e73746174602cfbff975c4d8d30d1243ccb343b9db51c2f2f22b444c6297913d09b67c5a755cef966cc0c05fba03f3fbe8974240999f48b4c38100e0965216510f3d28cbd9f8551b8ee57d0a5bd9a3bdb43411c9cbee957843dfd148e7b6eca0df81b532b75d3b4251ce0e7a5b7c55487c676cb027848fa9fe047a768cb69beb0e450ce69c1a6e382101f057f58dde4b09f483cdc45703902553ac673c1f1269e110094d3b3d259aa084eedd0159fab124ddb4a6fb1900d1e33394b51200ea2bf02565836293973fc1cf2fcf210e9b8", 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000380)={'icmp6\x00'}, &(0x7f00000003c0)=0x1e) 12:47:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001}, 0x2c) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 12:47:15 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x400, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$LOOP_CHANGE_FD(r0, 0x125f, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)="637075616363742e73746174602cfbff975c4d8d30d1243ccb343b9db51c2f2f22b444c6297913d09b67c5a755cef966cc0c05fba03f3fbe8974240999f48b4c38100e0965216510f3d28cbd9f8551b8ee57d0a5bd9a3bdb43411c9cbee957843dfd148e7b6eca0df81b532b75d3b4251ce0e7a5b7c55487c676cb027848fa9fe047a768cb69beb0e450ce69c1a6e382101f057f58dde4b09f483cdc45703902553ac673c1f1269e110094d3b3d259aa084eedd0159fab124ddb4a6fb1900d1e33394b51200ea2bf02565836293973fc1cf2fcf210e9b8", 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) 12:47:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) 12:47:16 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 12:47:16 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) eventfd(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffff9c, 0x10, &(0x7f0000000180)={&(0x7f0000000040)=""/185, 0xb9}}, 0x10) unshare(0x0) eventfd(0x0) socket$inet_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) write$evdev(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000140)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x0, {0x2, 0x0, @remote}, 'lo\x00'}) fcntl$getflags(0xffffffffffffffff, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000500)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") clock_gettime(0x0, &(0x7f0000000240)) recvmmsg(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f00000004c0)) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000300)="ed00000076") bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) 12:47:16 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:16 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x400, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$LOOP_CHANGE_FD(r0, 0x125f, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)="637075616363742e73746174602cfbff975c4d8d30d1243ccb343b9db51c2f2f22b444c6297913d09b67c5a755cef966cc0c05fba03f3fbe8974240999f48b4c38100e0965216510f3d28cbd9f8551b8ee57d0a5bd9a3bdb43411c9cbee957843dfd148e7b6eca0df81b532b75d3b4251ce0e7a5b7c55487c676cb027848fa9fe047a768cb69beb0e450ce69c1a6e382101f057f58dde4b09f483cdc45703902553ac673c1f1269e110094d3b3d259aa084eedd0159fab124ddb4a6fb1900d1e33394b51200ea2bf02565836293973fc1cf2fcf210e9b8", 0x0, 0x0) fchdir(0xffffffffffffffff) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000380)={'icmp6\x00'}, &(0x7f00000003c0)=0x1e) 12:47:16 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:16 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 12:47:16 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x400, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$LOOP_CHANGE_FD(r0, 0x125f, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)="637075616363742e73746174602cfbff975c4d8d30d1243ccb343b9db51c2f2f22b444c6297913d09b67c5a755cef966cc0c05fba03f3fbe8974240999f48b4c38100e0965216510f3d28cbd9f8551b8ee57d0a5bd9a3bdb43411c9cbee957843dfd148e7b6eca0df81b532b75d3b4251ce0e7a5b7c55487c676cb027848fa9fe047a768cb69beb0e450ce69c1a6e382101f057f58dde4b09f483cdc45703902553ac673c1f1269e110094d3b3d259aa084eedd0159fab124ddb4a6fb1900d1e33394b51200ea2bf02565836293973fc1cf2fcf210e9b8", 0x0, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000380)={'icmp6\x00'}, &(0x7f00000003c0)=0x1e) 12:47:16 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:16 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x400, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$LOOP_CHANGE_FD(r0, 0x125f, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000380)={'icmp6\x00'}, &(0x7f00000003c0)=0x1e) 12:47:16 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 12:47:16 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x400, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$LOOP_CHANGE_FD(r0, 0x125f, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)="637075616363742e73746174602cfbff975c4d8d30d1243ccb343b9db51c2f2f22b444c6297913d09b67c5a755cef966cc0c05fba03f3fbe8974240999f48b4c38100e0965216510f3d28cbd9f8551b8ee57d0a5bd9a3bdb43411c9cbee957843dfd148e7b6eca0df81b532b75d3b4251ce0e7a5b7c55487c676cb027848fa9fe047a768cb69beb0e450ce69c1a6e382101f057f58dde4b09f483cdc45703902553ac673c1f1269e110094d3b3d259aa084eedd0159fab124ddb4a6fb1900d1e33394b51200ea2bf02565836293973fc1cf2fcf210e9b8", 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000380)={'icmp6\x00'}, &(0x7f00000003c0)=0x1e) 12:47:16 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 12:47:16 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x400, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) getpid() ioctl$LOOP_CHANGE_FD(r0, 0x125f, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)="637075616363742e73746174602cfbff975c4d8d30d1243ccb343b9db51c2f2f22b444c6297913d09b67c5a755cef966cc0c05fba03f3fbe8974240999f48b4c38100e0965216510f3d28cbd9f8551b8ee57d0a5bd9a3bdb43411c9cbee957843dfd148e7b6eca0df81b532b75d3b4251ce0e7a5b7c55487c676cb027848fa9fe047a768cb69beb0e450ce69c1a6e382101f057f58dde4b09f483cdc45703902553ac673c1f1269e110094d3b3d259aa084eedd0159fab124ddb4a6fb1900d1e33394b51200ea2bf02565836293973fc1cf2fcf210e9b8", 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000380)={'icmp6\x00'}, &(0x7f00000003c0)=0x1e) 12:47:17 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x46) 12:47:17 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:17 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 12:47:17 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:17 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x400, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) ioctl$LOOP_CHANGE_FD(r0, 0x125f, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)="637075616363742e73746174602cfbff975c4d8d30d1243ccb343b9db51c2f2f22b444c6297913d09b67c5a755cef966cc0c05fba03f3fbe8974240999f48b4c38100e0965216510f3d28cbd9f8551b8ee57d0a5bd9a3bdb43411c9cbee957843dfd148e7b6eca0df81b532b75d3b4251ce0e7a5b7c55487c676cb027848fa9fe047a768cb69beb0e450ce69c1a6e382101f057f58dde4b09f483cdc45703902553ac673c1f1269e110094d3b3d259aa084eedd0159fab124ddb4a6fb1900d1e33394b51200ea2bf02565836293973fc1cf2fcf210e9b8", 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000380)={'icmp6\x00'}, &(0x7f00000003c0)=0x1e) 12:47:17 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 12:47:17 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:17 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 12:47:17 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x400, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$LOOP_CHANGE_FD(r0, 0x125f, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)="637075616363742e73746174602cfbff975c4d8d30d1243ccb343b9db51c2f2f22b444c6297913d09b67c5a755cef966cc0c05fba03f3fbe8974240999f48b4c38100e0965216510f3d28cbd9f8551b8ee57d0a5bd9a3bdb43411c9cbee957843dfd148e7b6eca0df81b532b75d3b4251ce0e7a5b7c55487c676cb027848fa9fe047a768cb69beb0e450ce69c1a6e382101f057f58dde4b09f483cdc45703902553ac673c1f1269e110094d3b3d259aa084eedd0159fab124ddb4a6fb1900d1e33394b51200ea2bf02565836293973fc1cf2fcf210e9b8", 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000380)={'icmp6\x00'}, &(0x7f00000003c0)=0x1e) 12:47:17 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000180), &(0x7f0000000240), 0x8) prctl$setname(0xf, &(0x7f0000000040)='\x00') socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000380)=@req3, 0x1c) msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") socket$inet_udp(0x2, 0x2, 0x0) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) getegid() getegid() madvise(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000080)="42805da0124fefeddc0f01eea873fe19fa380f3821c401af7d52f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") io_setup(0x0, &(0x7f0000000440)) syz_open_dev$rtc(&(0x7f0000000500)='/dev/rtc#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000240)) creat(&(0x7f0000000040)='./file0/file0\x00', 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000003c0)={&(0x7f0000ff7000/0x4000)=nil, 0x4000}, &(0x7f0000000400)=0x3) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000002c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "3d8d3519ab907a0165e9beaaf13c7fcab3c666907a18ddfdda6209645181fb3a1e1ef9868e9ca93d7c32de9a5f47dd3c8d9435a398b9d7e93376d9b3b305b166348b72f005f443edfa8494cb753f95b2"}, 0xd8) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000200)={0x0, @aes256, 0x0, "3cf8a123eb2bde3f"}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='oom_adj\x00') write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14) gettid() geteuid() 12:47:17 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 12:47:17 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x400, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$LOOP_CHANGE_FD(r0, 0x125f, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)="637075616363742e73746174602cfbff975c4d8d30d1243ccb343b9db51c2f2f22b444c6297913d09b67c5a755cef966cc0c05fba03f3fbe8974240999f48b4c38100e0965216510f3d28cbd9f8551b8ee57d0a5bd9a3bdb43411c9cbee957843dfd148e7b6eca0df81b532b75d3b4251ce0e7a5b7c55487c676cb027848fa9fe047a768cb69beb0e450ce69c1a6e382101f057f58dde4b09f483cdc45703902553ac673c1f1269e110094d3b3d259aa084eedd0159fab124ddb4a6fb1900d1e33394b51200ea2bf02565836293973fc1cf2fcf210e9b8", 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000380)={'icmp6\x00'}, &(0x7f00000003c0)=0x1e) 12:47:17 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$LOOP_CHANGE_FD(r0, 0x125f, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)="637075616363742e73746174602cfbff975c4d8d30d1243ccb343b9db51c2f2f22b444c6297913d09b67c5a755cef966cc0c05fba03f3fbe8974240999f48b4c38100e0965216510f3d28cbd9f8551b8ee57d0a5bd9a3bdb43411c9cbee957843dfd148e7b6eca0df81b532b75d3b4251ce0e7a5b7c55487c676cb027848fa9fe047a768cb69beb0e450ce69c1a6e382101f057f58dde4b09f483cdc45703902553ac673c1f1269e110094d3b3d259aa084eedd0159fab124ddb4a6fb1900d1e33394b51200ea2bf02565836293973fc1cf2fcf210e9b8", 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000380)={'icmp6\x00'}, &(0x7f00000003c0)=0x1e) [ 1440.755260] audit: type=1326 audit(1537015637.825:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12438 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 [ 1440.821394] audit: type=1326 audit(1537015637.895:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12443 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 12:47:18 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:18 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x400, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x125f, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)="637075616363742e73746174602cfbff975c4d8d30d1243ccb343b9db51c2f2f22b444c6297913d09b67c5a755cef966cc0c05fba03f3fbe8974240999f48b4c38100e0965216510f3d28cbd9f8551b8ee57d0a5bd9a3bdb43411c9cbee957843dfd148e7b6eca0df81b532b75d3b4251ce0e7a5b7c55487c676cb027848fa9fe047a768cb69beb0e450ce69c1a6e382101f057f58dde4b09f483cdc45703902553ac673c1f1269e110094d3b3d259aa084eedd0159fab124ddb4a6fb1900d1e33394b51200ea2bf02565836293973fc1cf2fcf210e9b8", 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000380)={'icmp6\x00'}, &(0x7f00000003c0)=0x1e) 12:47:18 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:18 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 12:47:18 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$LOOP_CHANGE_FD(r0, 0x125f, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)="637075616363742e73746174602cfbff975c4d8d30d1243ccb343b9db51c2f2f22b444c6297913d09b67c5a755cef966cc0c05fba03f3fbe8974240999f48b4c38100e0965216510f3d28cbd9f8551b8ee57d0a5bd9a3bdb43411c9cbee957843dfd148e7b6eca0df81b532b75d3b4251ce0e7a5b7c55487c676cb027848fa9fe047a768cb69beb0e450ce69c1a6e382101f057f58dde4b09f483cdc45703902553ac673c1f1269e110094d3b3d259aa084eedd0159fab124ddb4a6fb1900d1e33394b51200ea2bf02565836293973fc1cf2fcf210e9b8", 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000380)={'icmp6\x00'}, &(0x7f00000003c0)=0x1e) [ 1441.406114] audit: type=1326 audit(1537015638.475:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12470 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 12:47:18 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:18 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x400, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$LOOP_CHANGE_FD(r0, 0x125f, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)="637075616363742e73746174602cfbff975c4d8d30d1243ccb343b9db51c2f2f22b444c6297913d09b67c5a755cef966cc0c05fba03f3fbe8974240999f48b4c38100e0965216510f3d28cbd9f8551b8ee57d0a5bd9a3bdb43411c9cbee957843dfd148e7b6eca0df81b532b75d3b4251ce0e7a5b7c55487c676cb027848fa9fe047a768cb69beb0e450ce69c1a6e382101f057f58dde4b09f483cdc45703902553ac673c1f1269e110094d3b3d259aa084eedd0159fab124ddb4a6fb1900d1e33394b51200ea2bf02565836293973fc1cf2fcf210e9b8", 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000380)={'icmp6\x00'}, &(0x7f00000003c0)=0x1e) 12:47:18 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x400, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$LOOP_CHANGE_FD(r0, 0x125f, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)="637075616363742e73746174602cfbff975c4d8d30d1243ccb343b9db51c2f2f22b444c6297913d09b67c5a755cef966cc0c05fba03f3fbe8974240999f48b4c38100e0965216510f3d28cbd9f8551b8ee57d0a5bd9a3bdb43411c9cbee957843dfd148e7b6eca0df81b532b75d3b4251ce0e7a5b7c55487c676cb027848fa9fe047a768cb69beb0e450ce69c1a6e382101f057f58dde4b09f483cdc45703902553ac673c1f1269e110094d3b3d259aa084eedd0159fab124ddb4a6fb1900d1e33394b51200ea2bf02565836293973fc1cf2fcf210e9b8", 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000380)={'icmp6\x00'}, &(0x7f00000003c0)=0x1e) 12:47:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000000000/0x11000)=nil, 0x11000, 0x3, 0x11, r2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:47:18 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x400, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) ioctl$LOOP_CHANGE_FD(r0, 0x125f, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)="637075616363742e73746174602cfbff975c4d8d30d1243ccb343b9db51c2f2f22b444c6297913d09b67c5a755cef966cc0c05fba03f3fbe8974240999f48b4c38100e0965216510f3d28cbd9f8551b8ee57d0a5bd9a3bdb43411c9cbee957843dfd148e7b6eca0df81b532b75d3b4251ce0e7a5b7c55487c676cb027848fa9fe047a768cb69beb0e450ce69c1a6e382101f057f58dde4b09f483cdc45703902553ac673c1f1269e110094d3b3d259aa084eedd0159fab124ddb4a6fb1900d1e33394b51200ea2bf02565836293973fc1cf2fcf210e9b8", 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000380)={'icmp6\x00'}, &(0x7f00000003c0)=0x1e) 12:47:18 executing program 3: syz_emit_ethernet(0x7a, &(0x7f0000000140)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "aabc7d", 0x44, 0x0, 0x0, @local, @ipv4={[], [], @dev}, {[], @gre}}}}}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000400), 0x32a) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) delete_module(&(0x7f0000000240)='\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@remote, @in=@multicast2}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000480)={@local}, 0x14) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000500), 0x4) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000580), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[]}}, 0x0) io_setup(0x0, &(0x7f0000000300)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 12:47:18 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x400, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x0, &(0x7f0000000200)) ioctl$LOOP_CHANGE_FD(r0, 0x125f, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)="637075616363742e73746174602cfbff975c4d8d30d1243ccb343b9db51c2f2f22b444c6297913d09b67c5a755cef966cc0c05fba03f3fbe8974240999f48b4c38100e0965216510f3d28cbd9f8551b8ee57d0a5bd9a3bdb43411c9cbee957843dfd148e7b6eca0df81b532b75d3b4251ce0e7a5b7c55487c676cb027848fa9fe047a768cb69beb0e450ce69c1a6e382101f057f58dde4b09f483cdc45703902553ac673c1f1269e110094d3b3d259aa084eedd0159fab124ddb4a6fb1900d1e33394b51200ea2bf02565836293973fc1cf2fcf210e9b8", 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000380)={'icmp6\x00'}, &(0x7f00000003c0)=0x1e) 12:47:19 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:19 executing program 0: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x400, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x125f, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)="637075616363742e73746174602cfbff975c4d8d30d1243ccb343b9db51c2f2f22b444c6297913d09b67c5a755cef966cc0c05fba03f3fbe8974240999f48b4c38100e0965216510f3d28cbd9f8551b8ee57d0a5bd9a3bdb43411c9cbee957843dfd148e7b6eca0df81b532b75d3b4251ce0e7a5b7c55487c676cb027848fa9fe047a768cb69beb0e450ce69c1a6e382101f057f58dde4b09f483cdc45703902553ac673c1f1269e110094d3b3d259aa084eedd0159fab124ddb4a6fb1900d1e33394b51200ea2bf02565836293973fc1cf2fcf210e9b8", 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000380)={'icmp6\x00'}, &(0x7f00000003c0)=0x1e) 12:47:19 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:19 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x400, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$LOOP_CHANGE_FD(r0, 0x125f, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)="637075616363742e73746174602cfbff975c4d8d30d1243ccb343b9db51c2f2f22b444c6297913d09b67c5a755cef966cc0c05fba03f3fbe8974240999f48b4c38100e0965216510f3d28cbd9f8551b8ee57d0a5bd9a3bdb43411c9cbee957843dfd148e7b6eca0df81b532b75d3b4251ce0e7a5b7c55487c676cb027848fa9fe047a768cb69beb0e450ce69c1a6e382101f057f58dde4b09f483cdc45703902553ac673c1f1269e110094d3b3d259aa084eedd0159fab124ddb4a6fb1900d1e33394b51200ea2bf02565836293973fc1cf2fcf210e9b8", 0x0, 0x0) fchdir(0xffffffffffffffff) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000380)={'icmp6\x00'}, &(0x7f00000003c0)=0x1e) 12:47:19 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") [ 1442.318349] audit: type=1326 audit(1537015639.385:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12516 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 12:47:19 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:19 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000040), 0x10000, &(0x7f0000000540)={&(0x7f0000000000)=ANY=[], 0x3}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00000000b00a978a8181a33fd3f7f4f2bc0c14732c063b345200d56e8b1f7dd462afd49eb5d69fe700b83bab68f81d0189e4ecec0cf4f52e2eced8bfcc304482cb18dcd9d2a0a01a96db253b430c6e54bae2d2438f0182b4b692"], 0x5a}, 0x0) 12:47:19 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:19 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000d01000)=0x7ff, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x178, 0x4) sendto$inet6(r1, &(0x7f0000adb000)="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", 0x7d0, 0x0, &(0x7f0000809000)={0xa, 0x4e24}, 0x1c) 12:47:19 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:20 executing program 3: prctl$setname(0xf, &(0x7f00000003c0)="2f6465762f6d6964692305aa9f527a5af79424c119705b2bcaab29dcc355b35e") rt_sigaction(0x0, &(0x7f0000000140)={&(0x7f0000000040)="66470f3a0aa0f63f0000e43e67663e417fbb3ef30fb8acc30d000000460fc314a26766420fd0948fd6be0000f30f1b37f20f2c7c6bcb66410f69fb1978ffc46141580ce2", {}, 0x0, &(0x7f00000000c0)="8fa9280177e465450fd46a69f30fd6dff3ab6584f9c423056d6ce007e70fc5d7ffc462259aa800100002660f3a442869c46155159bfeefffff"}, &(0x7f0000000200)={&(0x7f0000000180)="c4a27934fe3e46dde1c4e3357a6674f70fe7a605000000663641d9f3c4c1fc5a152e000000c461f8523f670f0f88710000000df20f79d2c4e2159174ff00", {}, 0x0, &(0x7f00000001c0)="c4e17c290e2e672e3e66470ff7e8c46219bc8600000000c4a2790fb03b000000c4623528960d000000c48261dd1044d9d0c4417ddbc71cd0a4"}, 0x8, &(0x7f0000000240)) pipe2(&(0x7f0000000740), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev}}, {{}, 0x0, @in6}}, &(0x7f00000008c0)=0xe8) getresgid(&(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000980)) fchownat(0xffffffffffffffff, &(0x7f0000000780)='./file1\x00', 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='personality\x00') ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="f942805da0690a0d43eece41ff0fa4373766430f78c7070343c84f0019c462fd1e28a6c4e1d012e45ff8b87545d745c945c9c4010d8e64ac1e5731a3b7b74379dfb9d6adbe90dfe25c4b8967") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@remote, @in=@dev}}, {{@in=@multicast2}}}, &(0x7f0000000300)=0xe8) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400)) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000700)=0x1c) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000640)={0x90}, 0x90) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000380)) 12:47:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000280)={0x40000000000002, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x108) 12:47:20 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:20 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:20 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000080)=0x3, 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000100)=@hci, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000600)=""/219, 0xdb}, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) 12:47:20 executing program 1: eventfd(0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000400)) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) futex(&(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000300)={0x0, 0x989680}, &(0x7f00000003c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000440), 0x0) signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000500)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@multicast1, @multicast2}, &(0x7f00000006c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@mcast1}, &(0x7f0000000800)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@dev, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@multicast1}}, &(0x7f0000000a00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000700)=0xfffffffffffffdbb) getsockname$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000bc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'bpq0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in=@remote, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000d40)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000011c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001280)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000012c0)={{{@in=@rand_addr, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f00000013c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001400)={{{@in=@multicast1, @in6}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000001500)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001540)={{{@in, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000001640)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001680)={{{@in=@dev, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000001780)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000017c0)={{{@in6, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f00000018c0)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000019c0)=0x80) getpeername$packet(0xffffffffffffffff, &(0x7f0000004a00), &(0x7f0000004a40)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005340)={&(0x7f0000000440), 0xc, &(0x7f0000005300)={&(0x7f0000004a80)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000600)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 12:47:20 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@local, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000840)={'nat\x00'}, &(0x7f00000008c0)=0x78) 12:47:20 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:20 executing program 0: rt_sigprocmask(0x0, &(0x7f0000000180), &(0x7f0000000240), 0x8) prctl$setname(0xf, &(0x7f0000000040)='\x00') socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000380)=@req3, 0x1c) msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") socket$inet_udp(0x2, 0x2, 0x0) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) getegid() getegid() madvise(&(0x7f0000f44000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000080)="42805da0124fefeddc0f01eea873fe19fa380f3821c401af7d52f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") io_setup(0x0, &(0x7f0000000440)) syz_open_dev$rtc(&(0x7f0000000500)='/dev/rtc#\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000240)) creat(&(0x7f0000000040)='./file0/file0\x00', 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000003c0)={&(0x7f0000ff7000/0x4000)=nil, 0x4000}, &(0x7f0000000400)=0x3) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000002c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "3d8d3519ab907a0165e9beaaf13c7fcab3c666907a18ddfdda6209645181fb3a1e1ef9868e9ca93d7c32de9a5f47dd3c8d9435a398b9d7e93376d9b3b305b166348b72f005f443edfa8494cb753f95b2"}, 0xd8) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000200)={0x0, @aes256, 0x0, "3cf8a123eb2bde3f"}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='oom_adj\x00') write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14) 12:47:20 executing program 1: r0 = socket(0x40000000002, 0x2000000000000003, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='bond0\x00', 0x10) sendto$unix(r0, &(0x7f0000000080), 0x640, 0x0, &(0x7f0000000d00)=@abs, 0x63) 12:47:20 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001840)='/dev/uinput\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7fff, {0x0, 0x0, 0x4}}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000280)=""/66, 0x42, 0x0, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001500)={{{@in=@remote, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000001600)=0xe8) 12:47:20 executing program 1: epoll_pwait(0xffffffffffffffff, &(0x7f0000000180), 0x1dd, 0x0, &(0x7f0000000140), 0x296) syz_extract_tcp_res$synack(&(0x7f0000000380), 0x1, 0x0) inotify_init() socket$inet6_tcp(0xa, 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x18) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000002e80), 0xffffffffffffffff) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() seccomp(0x0, 0x0, &(0x7f0000000400)={0x0, &(0x7f00000003c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0x0, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000440)='cgroup+procmime_type+em0\x00', 0xffffffffffffffff}, 0x30) recvmmsg(0xffffffffffffffff, &(0x7f000000d640), 0x0, 0x0, &(0x7f000000d8c0)) getpeername$packet(0xffffffffffffffff, &(0x7f000000d900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000d940)=0x14) clock_gettime(0x0, &(0x7f0000000080)) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) inotify_init() socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000580)) dup(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) 12:47:20 executing program 3: prctl$setname(0xf, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) pipe2(&(0x7f00000003c0), 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) restart_syscall() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000040)) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200)) rt_sigpending(&(0x7f0000000080), 0x8) socket$inet6(0xa, 0x0, 0x0) syz_execute_func(&(0x7f0000000d80)="428055a08f6969ef69dc00d9c4e17911466fc841ff0f1837c4c3397c2a060f38211a40a5819086d9f28fc9410feee50f50e67545c421a22a04a00f2e1a1a0126460fe4e731a3b786e2989f7f") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 12:47:20 executing program 0: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x8, 0x1, @dev}]}, 0x20}}, 0x0) 12:47:21 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:21 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:21 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:21 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:21 executing program 1: clock_getres(0xfffffffffffffffc, &(0x7f00000001c0)) ustat(0x0, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) sched_getparam(0x0, &(0x7f00000002c0)) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480), 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000300), 0x4) getpgid(0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) syncfs(0xffffffffffffffff) geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@multicast1, @in6}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0xfffffffffffffdfd) clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") dup2(0xffffffffffffffff, 0xffffffffffffff9c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0x18) getgroups(0x0, &(0x7f00000000c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@remote, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f00000000c0)=0xe8) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)) mq_open(&(0x7f0000000200)='\x00', 0x0, 0x0, &(0x7f0000000500)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000700)=ANY=[], 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000600)) setfsgid(0x0) futex(&(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), 0x0) 12:47:21 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:21 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:22 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:22 executing program 3: prctl$setname(0xf, &(0x7f00000003c0)="2f6465762f6d6964692305aa9f527a5af79424c119705b2bcaab29dcc355b35e") rt_sigaction(0x0, &(0x7f0000000140)={&(0x7f0000000040)="66470f3a0aa0f63f0000e43e67663e417fbb3ef30fb8acc30d000000460fc314a26766420fd0948fd6be0000f30f1b37f20f2c7c6bcb66410f69fb1978ffc46141580ce2", {}, 0x0, &(0x7f00000000c0)="8fa9280177e465450fd46a69f30fd6dff3ab6584f9c423056d6ce007e70fc5d7ffc462259aa800100002660f3a442869c46155159bfeefffff"}, &(0x7f0000000200)={&(0x7f0000000180)="c4a27934fe3e46dde1c4e3357a6674f70fe7a605000000663641d9f3c4c1fc5a152e000000c461f8523f670f0f88710000000df20f79d2c4e2159174ff00", {}, 0x0, &(0x7f00000001c0)="c4e17c290e2e672e3e66470ff7e8c46219bc8600000000c4a2790fb03b000000c4623528960d000000c48261dd1044d9d0c4417ddbc71cd0a4"}, 0x8, &(0x7f0000000240)) pipe2(&(0x7f0000000740), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev}}, {{}, 0x0, @in6}}, &(0x7f00000008c0)=0xe8) getresgid(&(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000980)) fchownat(0xffffffffffffffff, &(0x7f0000000780)='./file1\x00', 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='personality\x00') ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="f942805da0690a0d43eece41ff0fa4373766430f78c7070343c84f0019c462fd1e28a6c4e1d012e45ff8b87545d745c945c9c4010d8e64ac1e5731a3b7b74379dfb9d6adbe90dfe25c4b8967") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@remote, @in=@dev}}, {{@in=@multicast2}}}, &(0x7f0000000300)=0xe8) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400)) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000700)=0x1c) 12:47:22 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000005c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000600)={0x14, 0x26, 0x601}, 0x14}}, 0x0) 12:47:22 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:22 executing program 1: epoll_pwait(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), 0x8) syz_extract_tcp_res$synack(&(0x7f0000000380), 0x1, 0x0) inotify_init() socket$inet6_tcp(0xa, 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x18) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) clock_settime(0x0, &(0x7f0000000040)={0x0, 0x1c9c380}) openat$null(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/null\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f00000003c0)=""/203, &(0x7f0000000080)=0xcb) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000000940)=0x10) getitimer(0x0, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000002e80), 0xffffffffffffffff) creat(&(0x7f00000004c0)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() seccomp(0x0, 0x0, &(0x7f0000000400)={0x0, &(0x7f00000003c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0x0, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000440)='cgroup+procmime_type+em0\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) inotify_init() socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000580)) dup(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) 12:47:22 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:22 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:23 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:23 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:23 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) 12:47:23 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket(0x40000000002, 0x2000000000000003, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='bond0\x00', 0x10) sendto$unix(r1, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) 12:47:23 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x4) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet6_buf(r0, 0x29, 0x80000000000015, &(0x7f0000000040)="40537398bccf410fcaf3d3ea6c8e74fc2cfe9980448b5b7ba33f4fa6c92c18a909cb5b2abd3da23b7fb8586c4307901a071fcb9d751f543604c3", 0x3a) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 12:47:23 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f00000002c0), &(0x7f0000000300)=0x4) 12:47:23 executing program 3: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setrlimit(0x0, &(0x7f0000000400)) select(0x40, &(0x7f0000000240), &(0x7f0000000280)={0x1}, &(0x7f0000000340), &(0x7f0000000380)={0x77359400}) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f0000000500), 0x0, 0xfffffffffffffffd) memfd_create(&(0x7f0000000300)='selinuxem0vboxnet1\x00', 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000700)) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f00000002c0), 0xc) keyctl$setperm(0x12, 0x0, 0x0) memfd_create(&(0x7f0000000040)='posix_acl_access}%\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fsync(0xffffffffffffffff) syz_execute_func(&(0x7f0000000540)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) mount(&(0x7f0000000480)=ANY=[], &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) bind$unix(0xffffffffffffffff, &(0x7f00000009c0)=@abs, 0x6e) syz_open_dev$evdev(&(0x7f0000000640)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000680)='trusted.overlay.origin\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) getpid() ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000600)={0x0, @multicast2, 0x0, 0x0, 'lc\x00'}, 0x2c) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @multicast1}, &(0x7f0000000080)=0xc) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) getrusage(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) 12:47:23 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) 12:47:23 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:23 executing program 1: futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f0000000180)={0x77359400}, &(0x7f0000000080), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1c, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "7ab439ea9686726bfabc4462b499c9875263b31736f93eb15fa8aba2c8f8f2ec02c96d354931be195c8812b83612d3e80f2ada1f63db4e78af030718956d254433d36563f2130380b510e943d25c2a3c"}, 0xd8) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") socket$unix(0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000880)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) connect$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) getitimer(0x0, &(0x7f0000000280)) pipe(&(0x7f00000000c0)) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0xfffffffffffffff8) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000780)) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000b00)) stat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000b80)) getgroups(0x0, &(0x7f0000000a00)) lstat(&(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000900)='system.posix_acl_access\x00', &(0x7f0000002180), 0x24, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) getegid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000300), 0xc, &(0x7f0000000340), 0x0, &(0x7f0000001f80)}, 0x0) 12:47:23 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:24 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:24 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) 12:47:24 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:24 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:24 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:24 executing program 1: r0 = socket(0x10, 0x4000000000000002, 0x0) write(r0, &(0x7f0000000040)="1f0000000104fffc54595d9ea0b0ff38fdff6eb593266e2906958e9019dafd3b", 0x20) 12:47:25 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000100)="390000001300090468fe0700000000000700ff3f07000000450001070000001419001a000400020007000000582b7b8094c302739bdd2a1ffc", 0x39}], 0x1) 12:47:25 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000380)={@dev, @multicast2, 0x0}, &(0x7f0000000480)=0xc) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000400)={@dev={0xfe, 0x80, [], 0x1a}, @empty, @remote, 0x401, 0x3, 0x1, 0x0, 0x5, 0x0, r2}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bond0\x00', r3}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r4}, 0x14) accept$packet(r0, &(0x7f0000000100), &(0x7f00000002c0)=0x14) r5 = socket$inet6(0xa, 0x3, 0xff) getsockopt$IP6T_SO_GET_INFO(r5, 0x29, 0x40, &(0x7f0000000300)={'raw\x00'}, &(0x7f0000000000)=0x54) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={'gretap0\x00', {0x2, 0x4e24, @remote}}) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bond0\x00'}) 12:47:25 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={"626f6e643000000001feffff00"}) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'veth0_to_bond\x00', {0x2, 0x4e22, @broadcast}}) 12:47:25 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:25 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:25 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:26 executing program 3: r0 = socket$inet6(0x10, 0x400000000003, 0x0) sendmsg(r0, &(0x7f00000001c0)={&(0x7f00000002c0)=@nl=@kern={0x10, 0x9, 0x8000000000000000}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000240)="5500000018007f7000fe01b2a4a280930a600080fea8430291000000390009002300fbff010000000d0005000be9ffffffffc68b65082314e9030b9d566885b16732009b84e7b1df136ef75af90000000000000000", 0x55}], 0x1, &(0x7f0000000000)}, 0x0) 12:47:26 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f00000001c0)=""/5, 0xfffffef1, 0x2000, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0xfffffe55) 12:47:26 executing program 1: eventfd(0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clock_gettime(0x0, &(0x7f0000000040)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) pipe2(&(0x7f0000000200), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000440)) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f00000005c0)=0xfffffffffffffd87) getpgrp(0x0) stat(&(0x7f00000009c0)='./file0/../file0\x00', &(0x7f0000000a40)) getgid() gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@dev}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000940)=0xe8) getgid() pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) getuid() getresgid(&(0x7f0000000980), &(0x7f0000000340), &(0x7f0000000580)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f0000000440)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0956969ef69dc00d99069203737c3397c2a450f01d60f38211ac4c207dd2bf3f3a70f157a9e400f01ef640f1b7996417545c462010d42002e1a1a3ef0d7f65855010131a3b786e2989fc4227992749f55") sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000180)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c560044315466141a1a01bf64ac1e5d31a3b786e2989f7f") 12:47:26 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:26 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:26 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:26 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:26 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000001c0), &(0x7f0000000700)='team0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$unix(0x1, 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="42805da0c60fef69dc0f01eece73fe550fc60079380f38211af3c46178138cd466d12b24c481b5e5bc2b0000002167f00fbab204000000ca6b2179da5ce5417545bde02e1a1a010d64ac1e5d31a3b744dbe271fb0703") [ 1449.750151] IPVS: ftp: loaded support on port[0] = 21 12:47:26 executing program 1: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) io_setup(0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000640), 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000680)) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000540), &(0x7f0000000580)={0x0, 0x989680}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f00000003c0)={&(0x7f0000000040)=ANY=[]}}, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000340)={0x28, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa, '/dev/rtc0\x00'}}, 0xffe4) getpid() ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=""/160, 0xa0}) unshare(0x0) getpid() syz_open_pts(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)={0x0, @aes256}) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000002c0)=0x14, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)=ANY=[]}}, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f00000000c0)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000b80)='cgroup.subtree_control\x00', 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/ptmx\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001d40)="428055a0866969ef69dc00d93e3e3e660f381ecaa71837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 12:47:27 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:27 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:27 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:27 executing program 3: 12:47:27 executing program 3: 12:47:27 executing program 3: 12:47:27 executing program 1: 12:47:27 executing program 3: 12:47:28 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0a5c2d023c126285718070") r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000001300090468fe0700000000000700ff3f070601070000001419001a000400020007000000582b7b8094c302739bdd2a1ffce198ea0d", 0x39}], 0x1) [ 1452.550271] device bridge_slave_1 left promiscuous mode [ 1452.555837] bridge0: port 2(bridge_slave_1) entered disabled state [ 1452.620636] device bridge_slave_0 left promiscuous mode [ 1452.626098] bridge0: port 1(bridge_slave_0) entered disabled state [ 1454.629604] team0 (unregistering): Port device team_slave_1 removed [ 1454.639568] team0 (unregistering): Port device team_slave_0 removed [ 1454.650348] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1454.693854] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1454.770100] bond0 (unregistering): Released all slaves [ 1454.834354] bridge0: port 1(bridge_slave_0) entered blocking state [ 1454.841857] bridge0: port 1(bridge_slave_0) entered disabled state [ 1454.848814] device bridge_slave_0 entered promiscuous mode [ 1454.877847] bridge0: port 2(bridge_slave_1) entered blocking state [ 1454.884640] bridge0: port 2(bridge_slave_1) entered disabled state [ 1454.892197] device bridge_slave_1 entered promiscuous mode [ 1454.920754] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1454.947671] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1455.081829] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1455.128862] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1455.345167] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1455.352796] team0: Port device team_slave_0 added [ 1455.397377] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1455.405375] team0: Port device team_slave_1 added [ 1455.451072] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1455.498477] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1455.546327] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1455.553608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1455.573162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1455.610695] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1455.617902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1455.636217] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1456.067116] bridge0: port 2(bridge_slave_1) entered blocking state [ 1456.073539] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1456.080262] bridge0: port 1(bridge_slave_0) entered blocking state [ 1456.086609] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1456.093970] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1456.889856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1457.140110] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1457.227596] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1457.316199] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1457.322422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1457.329410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1457.422016] 8021q: adding VLAN 0 to HW filter on device team0 12:47:35 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:35 executing program 3: 12:47:35 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:35 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:35 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:35 executing program 1: 12:47:35 executing program 1: 12:47:35 executing program 3: 12:47:35 executing program 1: 12:47:36 executing program 3: 12:47:36 executing program 1: 12:47:36 executing program 3: 12:47:36 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:36 executing program 1: 12:47:36 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:36 executing program 3: 12:47:36 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:36 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:36 executing program 3: 12:47:36 executing program 1: 12:47:36 executing program 3: 12:47:36 executing program 1: 12:47:37 executing program 1: 12:47:37 executing program 3: 12:47:37 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:37 executing program 1: 12:47:37 executing program 3: 12:47:37 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:37 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:37 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:37 executing program 1: 12:47:37 executing program 3: 12:47:37 executing program 3: 12:47:37 executing program 1: 12:47:37 executing program 3: 12:47:37 executing program 1: 12:47:38 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:38 executing program 3: 12:47:38 executing program 1: 12:47:38 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:38 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:38 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:38 executing program 3: 12:47:38 executing program 1: 12:47:38 executing program 3: 12:47:38 executing program 1: 12:47:38 executing program 3: 12:47:38 executing program 1: 12:47:39 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:39 executing program 1: 12:47:39 executing program 3: 12:47:39 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:39 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:39 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:39 executing program 1: 12:47:39 executing program 3: 12:47:39 executing program 1: 12:47:39 executing program 3: 12:47:39 executing program 1: 12:47:39 executing program 3: 12:47:39 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:39 executing program 1: 12:47:39 executing program 3: 12:47:40 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:40 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:40 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:40 executing program 1: 12:47:40 executing program 3: 12:47:40 executing program 3: 12:47:40 executing program 1: 12:47:40 executing program 1: 12:47:40 executing program 3: 12:47:40 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:40 executing program 1: 12:47:40 executing program 3: 12:47:41 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:41 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:41 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:41 executing program 3: 12:47:41 executing program 1: 12:47:41 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:41 executing program 1: 12:47:41 executing program 3: 12:47:41 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:41 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:41 executing program 3: r0 = socket(0xa, 0x3, 0x1000000000ff) sendto$unix(r0, &(0x7f0000000140)="bc44eaef63e30fba06f7a9cb7744257a760d52aad649c107d9b2c5e9c932be37b0b28e76e4e21fa5", 0x28, 0x0, &(0x7f0000000080)=@abs, 0x6e) 12:47:41 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) set_thread_area(&(0x7f0000000040)={0x0, 0x0, 0x400}) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000340)={0x0, 0x6}) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r2, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:47:41 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:42 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:42 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:42 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:42 executing program 3: keyctl$set_reqkey_keyring(0x15, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000003600)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000400)=0x1c, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000003680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000700)) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)="cdd4561a5539dbc28f5fa2d054321c24", 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x0, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000640)}) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9ce41ff0f1837370f0fdaaac4c19086d9f28fc9410feefa4e2179fbe5e5c4c1e16a9901725e45c4010d64ac1e5d31a3b706e2989f3b690b5241") signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000cd8ff4)) listen(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000080)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[]}}, 0x0) memfd_create(&(0x7f0000000080)='/dev/rtc0\x00', 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200), 0x4) clock_adjtime(0x0, &(0x7f00000004c0)) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000340)) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000005dc0)) syz_genetlink_get_family_id$nbd(&(0x7f0000000440)='nbd\x00') 12:47:42 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:42 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:42 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:42 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:42 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) 12:47:42 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) [ 1465.969256] audit: type=1326 audit(1537015663.039:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13377 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 12:47:43 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) set_thread_area(&(0x7f0000000040)={0x0, 0x0, 0x400}) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000340)={0x0, 0x6}) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r2, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:47:43 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:43 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000080)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)={0xffffffffffffffff}) dup2(r0, r1) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000040)) 12:47:43 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:43 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:43 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) [ 1466.866627] audit: type=1326 audit(1537015663.939:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13405 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 12:47:44 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:44 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) set_thread_area(&(0x7f0000000040)={0x0, 0x0, 0x400}) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000340)={0x0, 0x6}) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r2, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:47:44 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:44 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:44 executing program 4: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006300)) fcntl$getown(0xffffffffffffffff, 0x9) [ 1467.790238] audit: type=1326 audit(1537015664.869:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13430 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 12:47:44 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:45 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) set_thread_area(&(0x7f0000000040)={0x0, 0x0, 0x400}) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000340)={0x0, 0x6}) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r2, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:47:45 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:46 executing program 3: 12:47:46 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:46 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:46 executing program 4: 12:47:46 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) set_thread_area(&(0x7f0000000040)={0x0, 0x0, 0x400}) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000340)={0x0, 0x6}) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r2, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) 12:47:46 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:46 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4c, &(0x7f0000000140)=0x10000000, 0x4) 12:47:46 executing program 3: clock_gettime(0x9, &(0x7f0000000200)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x4000000000001ca, 0x0, &(0x7f0000000680)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) getresuid(&(0x7f0000000340), &(0x7f0000000300), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000f40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001040)=0xe8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)) geteuid() getgroups(0x0, &(0x7f0000001140)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) msgget(0xffffffffffffffff, 0x0) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001740)={{{@in=@remote, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001840)=0xe8) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @ramp}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 12:47:47 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:47 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:47 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:47 executing program 4: mount(&(0x7f0000000700)=ANY=[], &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000400)=0xe8) getgroups(0x0, &(0x7f0000000440)) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000600)={0xa0}, 0xa0) getuid() getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000006c0)={0x0, &(0x7f0000000440)}) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x78}, 0x78) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000440)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() sched_getscheduler(0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000240)={'nat\x00'}, &(0x7f00000002c0)=0x78) syz_execute_func(&(0x7f0000000040)="f341da0fc48291044f972e460fe8ecc4035d69822b000000760ff1d30fbc744c28f043016c0af5c4637916d9008f0978c75b82c4c2ed0a64b6f2") 12:47:47 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) set_thread_area(&(0x7f0000000040)={0x0, 0x0, 0x400}) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000340)={0x0, 0x6}) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r2, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) socket$vsock_dgram(0x28, 0x2, 0x0) 12:47:47 executing program 3: eventfd(0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000400)) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) futex(&(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000300)={0x0, 0x989680}, &(0x7f00000003c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000440), 0x0) signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000500)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@multicast1, @multicast2}, &(0x7f00000006c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@mcast1}, &(0x7f0000000800)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@dev, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@multicast1}}, &(0x7f0000000a00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000700)=0xfffffffffffffdbb) getsockname$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000bc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={'bpq0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in=@remote, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000d40)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000011c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001280)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000012c0)={{{@in=@rand_addr, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f00000013c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001400)={{{@in=@multicast1, @in6}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000001500)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001540)={{{@in, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000001640)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001680)={{{@in=@dev, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000001780)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000017c0)={{{@in6, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f00000018c0)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000019c0)=0x80) syz_execute_func(&(0x7f0000000600)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 12:47:47 executing program 4: epoll_pwait(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140), 0x8) syz_extract_tcp_res$synack(&(0x7f0000000380), 0x1, 0x0) inotify_init() socket$inet6_tcp(0xa, 0x1, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x18) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) clock_settime(0x0, &(0x7f0000000040)={0x0, 0x1c9c380}) openat$null(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/null\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f00000003c0)=""/203, &(0x7f0000000080)=0xcb) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000000940)=0x10) getitimer(0x0, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000002e80), 0xffffffffffffffff) creat(&(0x7f00000004c0)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() seccomp(0x0, 0x0, &(0x7f0000000400)={0x0, &(0x7f00000003c0)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0x0, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000440)='cgroup+procmime_type+em0\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) inotify_init() socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000580)) dup(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") [ 1470.923001] audit: type=1326 audit(1537015667.994:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13497 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 12:47:48 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:48 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:48 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:48 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) set_thread_area(&(0x7f0000000040)={0x0, 0x0, 0x400}) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000340)={0x0, 0x6}) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:47:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr}}) 12:47:49 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:49 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:49 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:49 executing program 3: 12:47:49 executing program 3: 12:47:49 executing program 3: 12:47:49 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) set_thread_area(&(0x7f0000000040)={0x0, 0x0, 0x400}) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000340)={0x0, 0x6}) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) sendto$inet(r2, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:47:49 executing program 3: 12:47:49 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:50 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:50 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:50 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = socket(0xa, 0x200000000080002, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000180)={0x3c1}, 0x7) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000c80)) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000140)=ANY=[], 0x0) 12:47:50 executing program 3: 12:47:50 executing program 3: 12:47:50 executing program 4: 12:47:50 executing program 3: 12:47:50 executing program 4: 12:47:50 executing program 3: 12:47:51 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) set_thread_area(&(0x7f0000000040)={0x0, 0x0, 0x400}) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000340)={0x0, 0x6}) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r2, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:47:51 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:51 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:51 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:51 executing program 4: 12:47:51 executing program 3: 12:47:51 executing program 4: 12:47:51 executing program 3: 12:47:51 executing program 4: 12:47:51 executing program 3: 12:47:51 executing program 3: 12:47:51 executing program 4: 12:47:52 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) set_thread_area(&(0x7f0000000040)={0x0, 0x0, 0x400}) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000340)={0x0, 0x6}) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) connect$inet(0xffffffffffffffff, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:47:52 executing program 3: 12:47:52 executing program 4: 12:47:52 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:52 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:52 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:52 executing program 3: 12:47:52 executing program 4: 12:47:52 executing program 3: 12:47:52 executing program 4: 12:47:52 executing program 3: 12:47:52 executing program 3: 12:47:53 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) set_thread_area(&(0x7f0000000040)={0x0, 0x0, 0x400}) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000340)={0x0, 0x6}) r1 = socket(0x10, 0x802, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r2, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:47:53 executing program 4: 12:47:53 executing program 3: 12:47:53 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:53 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:53 executing program 2: capget(&(0x7f00000000c0), &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:53 executing program 4: 12:47:53 executing program 3: 12:47:53 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) set_thread_area(&(0x7f0000000040)={0x0, 0x0, 0x400}) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000340)={0x0, 0x6}) r1 = socket(0x10, 0x802, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r2, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:47:53 executing program 4: 12:47:53 executing program 3: 12:47:53 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) set_thread_area(&(0x7f0000000040)={0x0, 0x0, 0x400}) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000340)={0x0, 0x6}) r1 = socket(0x10, 0x802, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r2, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:47:53 executing program 3: 12:47:53 executing program 4: 12:47:53 executing program 4: 12:47:54 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:54 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:54 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) set_thread_area(&(0x7f0000000040)={0x0, 0x0, 0x400}) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000340)={0x0, 0x6}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:47:54 executing program 4: 12:47:54 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:54 executing program 3: socket$inet6(0xa, 0x803, 0x3) socketpair(0x0, 0x0, 0x0, &(0x7f0000000500)) r0 = socket$netlink(0x10, 0x3, 0x0) write(r0, &(0x7f0000000040)="220000002000070700be0000090007010a00001e00003c0000ff040405000c008000", 0x22) 12:47:54 executing program 4: 12:47:54 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:54 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:54 executing program 3: 12:47:54 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) set_thread_area(&(0x7f0000000040)={0x0, 0x0, 0x400}) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000340)={0x0, 0x6}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:47:54 executing program 4: 12:47:55 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:55 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) set_thread_area(&(0x7f0000000040)={0x0, 0x0, 0x400}) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000340)={0x0, 0x6}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:47:55 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:55 executing program 3: 12:47:55 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:55 executing program 4: 12:47:55 executing program 3: 12:47:55 executing program 4: 12:47:55 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:55 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:55 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) set_thread_area(&(0x7f0000000040)={0x0, 0x0, 0x400}) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:47:55 executing program 4: 12:47:56 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:56 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:56 executing program 3: 12:47:56 executing program 4: 12:47:56 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:56 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:47:56 executing program 3: 12:47:56 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:56 executing program 4: 12:47:56 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:56 executing program 3: 12:47:56 executing program 4: 12:47:56 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:56 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:56 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:56 executing program 3: 12:47:56 executing program 4: 12:47:56 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:47:56 executing program 3: 12:47:56 executing program 4: 12:47:56 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:57 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:57 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:57 executing program 4: 12:47:57 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:57 executing program 3: 12:47:57 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:57 executing program 4: 12:47:57 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:57 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:47:57 executing program 4: 12:47:57 executing program 3: [ 1480.735277] audit: type=1326 audit(1537015677.811:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13828 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 12:47:57 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:57 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:57 executing program 3: 12:47:57 executing program 4: 12:47:58 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") [ 1480.939961] audit: type=1326 audit(1537015678.021:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13847 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 12:47:58 executing program 4: 12:47:58 executing program 3: 12:47:58 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:58 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:58 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 12:47:58 executing program 4: 12:47:58 executing program 3: 12:47:58 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:47:58 executing program 3: 12:47:58 executing program 4: [ 1481.576304] audit: type=1326 audit(1537015678.651:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13869 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 12:47:58 executing program 2: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0xe) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) epoll_create(0x0) dup(0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) accept4(0xffffffffffffffff, &(0x7f0000000380)=@alg, &(0x7f0000000400)=0x80, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000340)={0x0, @speck128}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="facc09acd6d7e2de08d2f3b188768094", 0x10) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) writev(0xffffffffffffffff, &(0x7f0000000100), 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") [ 1481.658785] audit: type=1326 audit(1537015678.731:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13873 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 12:47:58 executing program 4: 12:47:58 executing program 3: [ 1481.788294] audit: type=1326 audit(1537015678.861:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13885 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 12:47:58 executing program 3: 12:47:59 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:47:59 executing program 5: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001880)={{{@in6, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000580)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, 0xe8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) getresgid(&(0x7f00000006c0), &(0x7f0000000600), &(0x7f0000000680)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/4096) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004a80)) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004b00)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f80)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f40)='(cpuset\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000062c0)) 12:47:59 executing program 4: 12:47:59 executing program 2: 12:47:59 executing program 3: 12:47:59 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:47:59 executing program 4: 12:47:59 executing program 3: 12:47:59 executing program 2: [ 1482.536621] audit: type=1326 audit(1537015679.611:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13906 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 12:47:59 executing program 3: 12:47:59 executing program 4: 12:47:59 executing program 2: 12:48:00 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:48:00 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:48:00 executing program 3: 12:48:00 executing program 4: 12:48:00 executing program 2: 12:48:00 executing program 5: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000580)=0x1) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) connect$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getitimer(0x0, &(0x7f0000000300)) socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/160, 0xa0}, 0x120) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/loop#\x00'}, 0x10) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000940)=0xe8) getegid() getuid() 12:48:00 executing program 2: clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f00000001c0), 0x0) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000006c0)=ANY=[], 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000940)) getuid() getresgid(&(0x7f0000000980), &(0x7f00000009c0), &(0x7f0000000a00)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a40)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000780)) lstat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000480), 0xc, &(0x7f0000000900), 0x0, &(0x7f0000000cc0)=ANY=[]}, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000300)=""/240) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000240)=""/106) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000200)) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000000c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000f00)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000580)=""/248, &(0x7f0000000680)=0xf8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000400)="42805da0520fef84dc0f01eece67f340660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0b2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 12:48:00 executing program 3: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f0000000240)) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$getown(0xffffffffffffffff, 0x9) capget(&(0x7f0000000140), &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @rand_addr}, 0x10) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000005c0)=""/4096) socket$nl_xfrm(0x10, 0x3, 0x6) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}, 0x10) syz_execute_func(&(0x7f0000000400)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 12:48:00 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)}, 0x20) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000000c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000140)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@multicast1, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x0, &(0x7f0000000540)) getgroups(0x0, &(0x7f0000000580)) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe(&(0x7f0000000240)) futimesat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={{0x77359400}, {0x0, 0x2710}}) inotify_init1(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) socket$packet(0x11, 0x0, 0x300) dup(0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000540)={0x0, &(0x7f0000000300)}) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000380), 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 12:48:00 executing program 3: clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f00000001c0), 0x0) linkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000006c0)=ANY=[], 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000940)) getuid() getresgid(&(0x7f0000000980), &(0x7f00000009c0), &(0x7f0000000a00)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a40)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000780)) lstat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000480), 0xc, &(0x7f0000000900), 0x0, &(0x7f0000000cc0)=ANY=[]}, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000300)=""/240) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000240)=""/106) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000002e40)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000200)) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000000c0)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000f00)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000580)=""/248, &(0x7f0000000680)=0xf8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000400)="42805da0520fef84dc0f01eece67f340660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0b2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 12:48:00 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:48:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:48:01 executing program 5: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000580)=0x1) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) connect$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getitimer(0x0, &(0x7f0000000300)) socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/160, 0xa0}, 0x120) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/loop#\x00'}, 0x10) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000940)=0xe8) getegid() getuid() 12:48:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) eventfd(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffff9c, 0x10, &(0x7f0000000180)={&(0x7f0000000040)=""/185, 0xb9}}, 0x10) unshare(0x0) eventfd(0x0) socket$inet_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) write$evdev(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000140)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x0, {0x2, 0x0, @remote}, 'lo\x00'}) fcntl$getflags(0xffffffffffffffff, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000500)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") clock_gettime(0x0, &(0x7f0000000240)) recvmmsg(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f00000004c0)) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000300)="ed00000076") bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000300)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c3c4227d18c840a564a741dfe0400f01efe5e5660f7e1b1a1a01bd01eec46219b981000000de00002e6426f30f2b05090000003f") 12:48:01 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)}, 0x20) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000000c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000140)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@multicast1, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x0, &(0x7f0000000540)) getgroups(0x0, &(0x7f0000000580)) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe(&(0x7f0000000240)) futimesat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={{0x77359400}, {0x0, 0x2710}}) inotify_init1(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) socket$packet(0x11, 0x0, 0x300) dup(0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000540)={0x0, &(0x7f0000000300)}) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000380), 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") [ 1484.589963] audit: type=1326 audit(1537015681.661:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13970 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 12:48:01 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:48:02 executing program 3: setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)=ANY=[@ANYRESOCT, @ANYPTR=&(0x7f00000000c0)=ANY=[]], 0x2) unshare(0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4004700c, 0x22) 12:48:02 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) eventfd(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffff9c, 0x10, &(0x7f0000000180)={&(0x7f0000000040)=""/185, 0xb9}}, 0x10) unshare(0x0) eventfd(0x0) socket$inet_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) write$evdev(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000140)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x0, {0x2, 0x0, @remote}, 'lo\x00'}) fcntl$getflags(0xffffffffffffffff, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000500)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") clock_gettime(0x0, &(0x7f0000000240)) recvmmsg(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f00000004c0)) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000300)="ed00000076") syz_execute_func(&(0x7f0000000300)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c3c4227d18c840a564a741dfe0400f01efe5e5660f7e1b1a1a01bd01eec46219b981000000de00002e6426f30f2b05090000003f") 12:48:02 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:48:02 executing program 5: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000580)=0x1) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) connect$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getitimer(0x0, &(0x7f0000000300)) socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/160, 0xa0}, 0x120) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/loop#\x00'}, 0x10) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000940)=0xe8) getegid() getuid() 12:48:02 executing program 3: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pipe2(&(0x7f00000004c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc) syz_extract_tcp_res(&(0x7f0000000180), 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200)={0x0, {{0x2, 0x0, @remote}}, {{0x2, 0x0, @multicast1}}}, 0x108) pipe(&(0x7f00000000c0)) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f00000000c0)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200)) gettid() syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') clock_gettime(0x0, &(0x7f0000000380)) ppoll(&(0x7f0000000340), 0x0, &(0x7f00000003c0), &(0x7f0000000480), 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 12:48:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) eventfd(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffff9c, 0x10, &(0x7f0000000180)={&(0x7f0000000040)=""/185, 0xb9}}, 0x10) unshare(0x0) eventfd(0x0) socket$inet_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) write$evdev(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000140)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x0, {0x2, 0x0, @remote}, 'lo\x00'}) fcntl$getflags(0xffffffffffffffff, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000500)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") clock_gettime(0x0, &(0x7f0000000240)) syz_execute_func(&(0x7f0000000300)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c3c4227d18c840a564a741dfe0400f01efe5e5660f7e1b1a1a01bd01eec46219b981000000de00002e6426f30f2b05090000003f") 12:48:02 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)}, 0x20) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000000c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000140)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@multicast1, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x0, &(0x7f0000000540)) getgroups(0x0, &(0x7f0000000580)) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe(&(0x7f0000000240)) futimesat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={{0x77359400}, {0x0, 0x2710}}) inotify_init1(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) socket$packet(0x11, 0x0, 0x300) dup(0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000540)={0x0, &(0x7f0000000300)}) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000380), 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 12:48:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) eventfd(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffff9c, 0x10, &(0x7f0000000180)={&(0x7f0000000040)=""/185, 0xb9}}, 0x10) unshare(0x0) eventfd(0x0) socket$inet_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) write$evdev(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000140)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x0, {0x2, 0x0, @remote}, 'lo\x00'}) fcntl$getflags(0xffffffffffffffff, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000500)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") clock_gettime(0x0, &(0x7f0000000240)) recvmmsg(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f00000004c0)) syz_execute_func(&(0x7f0000000300)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c3c4227d18c840a564a741dfe0400f01efe5e5660f7e1b1a1a01bd01eec46219b981000000de00002e6426f30f2b05090000003f") 12:48:02 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:48:02 executing program 2: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000580)=0xc) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) memfd_create(&(0x7f00000000c0)='\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000240)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) connect$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) getitimer(0x0, &(0x7f0000000300)) pipe(&(0x7f0000000480)) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f0000000340), 0x0, 0xfffffffffffffff8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000bc0)="428055a032b6b6410f140506000000ff0f183736e35cf364dee5d2d2d5f2a60e0e0970020fe9c09f66410b850f00000062c463cd6829f3c4028d97a8587a8f6fee8f2a1812cc789471fac4e14bc22a49052d052d3b19fddd4008356d0000000000f047305cccb241801b00656464f3446da03333420f709427771a69a500e3c4c13b137c12c441df99af000000dcfdc9c4427d0d1aa4212dfca50000262666430ffb348b1f7f") keyctl$get_security(0x11, 0x0, &(0x7f0000000380)=""/74, 0x4a) seccomp(0x0, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000540)}) 12:48:03 executing program 5: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000580)=0x1) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) connect$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getitimer(0x0, &(0x7f0000000300)) socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/160, 0xa0}, 0x120) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/loop#\x00'}, 0x10) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000940)=0xe8) getegid() getuid() [ 1486.081077] audit: type=1326 audit(1537015683.161:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14021 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 12:48:03 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:48:03 executing program 3: 12:48:03 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)}, 0x20) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000000c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000140)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@multicast1, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x0, &(0x7f0000000540)) getgroups(0x0, &(0x7f0000000580)) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe(&(0x7f0000000240)) futimesat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={{0x77359400}, {0x0, 0x2710}}) inotify_init1(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) socket$packet(0x11, 0x0, 0x300) dup(0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000540)={0x0, &(0x7f0000000300)}) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000380), 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 12:48:03 executing program 3: 12:48:03 executing program 3: 12:48:03 executing program 3: 12:48:03 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:48:03 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) socket$inet(0x2, 0x2, 0x0) fgetxattr(r0, &(0x7f0000000280)=@random={'security.', '/dev/input/event#\x00'}, &(0x7f00000001c0)=""/3, 0x3) 12:48:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) close(r0) 12:48:03 executing program 2: 12:48:04 executing program 2: 12:48:04 executing program 5: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000580)=0x1) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) connect$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getitimer(0x0, &(0x7f0000000300)) socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/160, 0xa0}, 0x120) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/loop#\x00'}, 0x10) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000940)=0xe8) getegid() 12:48:04 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:48:04 executing program 3: 12:48:04 executing program 4: 12:48:04 executing program 2: 12:48:04 executing program 3: 12:48:04 executing program 4: 12:48:04 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:48:04 executing program 2: 12:48:04 executing program 3: 12:48:04 executing program 4: 12:48:04 executing program 2: 12:48:05 executing program 5: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000580)=0x1) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) connect$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getitimer(0x0, &(0x7f0000000300)) socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/160, 0xa0}, 0x120) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/loop#\x00'}, 0x10) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000940)=0xe8) getegid() 12:48:05 executing program 4: 12:48:05 executing program 3: 12:48:05 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:48:05 executing program 2: 12:48:05 executing program 4: 12:48:05 executing program 2: 12:48:05 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:48:05 executing program 4: 12:48:05 executing program 3: 12:48:05 executing program 2: 12:48:05 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:48:05 executing program 5: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000580)=0x1) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) connect$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getitimer(0x0, &(0x7f0000000300)) socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/160, 0xa0}, 0x120) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/loop#\x00'}, 0x10) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000940)=0xe8) getegid() 12:48:05 executing program 2: 12:48:05 executing program 3: 12:48:05 executing program 4: 12:48:05 executing program 2: 12:48:05 executing program 4: 12:48:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) getsockname(r0, &(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @reserved}, &(0x7f0000000080)=0x80) 12:48:06 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:48:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) r1 = getpid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000180)=r1) sendto$inet(r0, &(0x7f00000001c0), 0xffffffffffffffe5, 0x200007ff, &(0x7f0000000100)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f00000002c0)=' ', 0x1, 0x1, &(0x7f0000000200)={0x2, 0x0, @dev}, 0x10) 12:48:06 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) socketpair$inet(0x2, 0x0, 0x18000000, &(0x7f0000000700)) openat$null(0xffffffffffffff9c, &(0x7f0000000740)='/dev/null\x00', 0x0, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000180)) accept$inet(0xffffffffffffffff, &(0x7f0000000800)={0x2, 0x0, @dev}, &(0x7f0000000280)=0x10) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000240)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000dc0)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)) 12:48:06 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:48:06 executing program 3: eventfd(0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clock_gettime(0x0, &(0x7f0000000040)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) pipe2(&(0x7f0000000200), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000440)) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f00000005c0)=0xfffffffffffffd87) getpgrp(0x0) stat(&(0x7f00000009c0)='./file0/../file0\x00', &(0x7f0000000a40)) getgid() gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@dev}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000940)=0xe8) getgid() pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) getuid() getresgid(&(0x7f0000000980), &(0x7f0000000340), &(0x7f0000000580)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0956969ef69dc00d99069203737c3397c2a450f01d60f38211ac4c207dd2bf3f3a70f157a9e400f01ef640f1b7996417545c462010d42002e1a1a3ef0d7f65855010131a3b786e2989fc4227992749f55") sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) syz_execute_func(&(0x7f0000000180)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c560044315466141a1a01bf64ac1e5d31a3b786e2989f7f") 12:48:06 executing program 5: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000580)=0x1) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) connect$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getitimer(0x0, &(0x7f0000000300)) socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/160, 0xa0}, 0x120) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/loop#\x00'}, 0x10) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000940)=0xe8) getuid() 12:48:06 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x0, 0x64031, 0xffffffffffffffff, 0x0) 12:48:06 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) getsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000340), &(0x7f0000000280)=0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) 12:48:06 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0a5c2d023c126285718070") close(r0) 12:48:06 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:48:06 executing program 2: clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() r1 = syz_open_procfs(0x0, &(0x7f0000000180)='task\x00') sched_setscheduler(r0, 0x5, &(0x7f0000000140)) renameat(r1, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00') inotify_add_watch(r1, &(0x7f00000000c0)='./file0\x00', 0x80000000) 12:48:07 executing program 2: clock_getres(0x6, &(0x7f0000000040)) ustat(0x0, &(0x7f0000000680)) syz_extract_tcp_res$synack(&(0x7f00000002c0), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") memfd_create(&(0x7f0000000080)='\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000340)) gettid() geteuid() getgid() fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000500)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000780)=""/158, 0x9e}) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) getgid() socket$alg(0x26, 0x5, 0x0) pipe2(&(0x7f0000000600), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000300), 0x0, &(0x7f0000000700)=ANY=[]}, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @dev}, &(0x7f00000001c0)=0x10, 0x0) 12:48:07 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:48:07 executing program 3: prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) truncate(&(0x7f0000000380)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") pipe2(&(0x7f0000000040), 0x0) openat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000440), 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340), 0x14) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000540)='/dev/hwrng\x00', 0x0, 0x0) 12:48:07 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001, 0x0, 0x0}, 0x2c) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000700)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000240)={0x0, @aes256, 0x0, "94bca0c28588cd72"}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) eventfd(0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000180)) memfd_create(&(0x7f0000000080)=']{\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x4) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000007c0)=""/4096, 0x1000, 0x0, &(0x7f0000002240)=@ethernet={0x0, @random="201511d357a5"}, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000400)) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) fstat(0xffffffffffffffff, &(0x7f00000017c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001840)={{{@in6=@dev, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000001940)=0xe8) lstat(&(0x7f0000001980)='./file0\x00', &(0x7f00000019c0)) fstat(0xffffffffffffffff, &(0x7f0000001a40)) stat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001b80)={{{@in=@multicast1, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000001c80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001cc0), &(0x7f0000001d00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001d40)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000001e40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e80), &(0x7f0000001ec0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000046c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000047c0)=0xe8) lstat(&(0x7f0000004800)='./file0\x00', &(0x7f0000004840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000048c0), &(0x7f0000004900)=0xc) getgroups(0x0, &(0x7f0000004940)) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5c4a2b54564f46c800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 12:48:07 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:48:07 executing program 5: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000580)=0x1) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) connect$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getitimer(0x0, &(0x7f0000000300)) socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/160, 0xa0}, 0x120) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/loop#\x00'}, 0x10) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000940)=0xe8) getuid() 12:48:07 executing program 2: clock_getres(0x6, &(0x7f0000000040)) ustat(0x0, &(0x7f0000000680)) syz_extract_tcp_res$synack(&(0x7f00000002c0), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") memfd_create(&(0x7f0000000080)='\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000340)) gettid() geteuid() getgid() fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000500)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000780)=""/158, 0x9e}) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) getgid() socket$alg(0x26, 0x5, 0x0) pipe2(&(0x7f0000000600), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000300), 0x0, &(0x7f0000000700)=ANY=[]}, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @dev}, &(0x7f00000001c0)=0x10, 0x0) 12:48:08 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000280)=@in6={0xa, 0x0, 0x4, @loopback}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000001e80)=[{0x10}], 0x10}}], 0x1, 0x4) 12:48:08 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:48:08 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001, 0x0, 0x0}, 0x2c) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000700)=ANY=[]) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) eventfd(0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000180)) memfd_create(&(0x7f0000000080)=']{\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x4) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000022c0)=""/4096, 0x1000, 0x0, &(0x7f0000002240)=@ipx={0x4, 0x0, 0x0, "5d6f634e9e66"}, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgid() seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000001440)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a07c463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") gettid() openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, "46f23ca04c060fc4b61a9acb13c3dc47f6bfd57af89e8e93edfa2ba4a603033d"}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 12:48:08 executing program 4: r0 = socket$inet6(0xa, 0x2000000802, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000100)=@in6={0xa, 0x4e24, 0x0, @dev}, 0x80, &(0x7f0000000180), 0x0, &(0x7f0000000180)=ANY=[]}, 0x0) 12:48:08 executing program 5: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000580)=0x1) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) connect$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getitimer(0x0, &(0x7f0000000300)) socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/160, 0xa0}, 0x120) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/loop#\x00'}, 0x10) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000940)=0xe8) getuid() 12:48:08 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/net\x00') r1 = fcntl$dupfd(r0, 0x0, r0) fchown(r1, 0x0, 0x0) 12:48:08 executing program 2: close(0xffffffffffffffff) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f00000005c0)="fc0000004a000700ab092500090007000aab80ff010000680000369321000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548de02000000000000000175e63fb8d38a873cf1", 0xfc) 12:48:08 executing program 4: prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) gettid() getpriority(0x0, 0x0) accept(0xffffffffffffff9c, &(0x7f0000000700)=@generic, &(0x7f0000000780)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000002240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f00000007c0), 0xc, &(0x7f0000000940)={&(0x7f0000000200)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpgrp(0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)) syz_open_procfs(0x0, &(0x7f00000009c0)='net/udplite6\x00') ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000180)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000400), 0xc, &(0x7f0000000480)={&(0x7f0000000200)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000c00)) getrusage(0x0, &(0x7f0000000bc0)) rename(&(0x7f0000000540)='./file0\x00', &(0x7f0000000140)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000880)=0xc) timer_create(0x0, &(0x7f00000000c0), &(0x7f00000001c0)) getresuid(&(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0)) clock_gettime(0x0, &(0x7f0000000900)) pipe(&(0x7f00000003c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x50, &(0x7f0000000740)}, 0x2ea) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0), 0x4) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000400)) creat(&(0x7f0000000940)='./file0\x00', 0x0) getresgid(&(0x7f0000000240), &(0x7f00000005c0), &(0x7f0000000700)) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000640)={0x0, @broadcast, 0x0, 0x0, 'none\x00'}, 0x2c) 12:48:08 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) [ 1491.843409] netlink: 180 bytes leftover after parsing attributes in process `syz-executor2'. [ 1491.891992] netlink: 180 bytes leftover after parsing attributes in process `syz-executor2'. 12:48:09 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @remote}}) 12:48:09 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:48:09 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:48:09 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:48:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000000019, &(0x7f0000548000)=0x4001, 0x4) sendto$inet6(r0, &(0x7f00000000c0), 0xfffffffffffffceb, 0x0, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c) sendto$inet6(r0, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e21}, 0x1c) recvmsg(r0, &(0x7f0000000400)={&(0x7f00000001c0)=@nl=@proc, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000080)=""/36, 0x24}, 0x2000) 12:48:09 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:48:09 executing program 3: ustat(0xb, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f21efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000180)) 12:48:09 executing program 5: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000580)=0x1) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) connect$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getitimer(0x0, &(0x7f0000000300)) socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/160, 0xa0}, 0x120) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/loop#\x00'}, 0x10) getpid() getegid() getuid() 12:48:09 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:48:09 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:48:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8994, 0xffffffffffffffff) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f0000000000)=0x6e, 0x0) 12:48:09 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000140)={'veth1\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f0000000080)}}) 12:48:09 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:48:10 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") [ 1492.937181] veth1: mtu less than device minimum 12:48:10 executing program 2: mknod(&(0x7f0000000ffa)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 12:48:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=ANY=[@ANYBLOB="2c0e0407004023000000000000000000000000000000000900000000000000000000ffffac1414aa0000000000000000000000000000000100000000000000000000ffff00000000000000000000000000000000487d0000ff02000000000000000000000000000100000000000000000000ffffe0000001"], 0x1) 12:48:10 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:48:10 executing program 4: r0 = socket(0x40000000002, 0x2000000000000003, 0x2) setsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f0000000000), 0x4) 12:48:10 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rtc0\x00', 0x6b6600, 0x0) pipe2(&(0x7f0000000440), 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000480)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) timerfd_create(0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000500)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.type\x00', 0x2, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x18}, 0x18) socket$inet6_tcp(0xa, 0x1, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") seccomp(0x0, 0x0, &(0x7f0000000100)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000280)=@xdp, &(0x7f0000000180)=0x80) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000300)={@loopback}, 0x14) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 12:48:10 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:48:10 executing program 4: clone(0x888d00, &(0x7f0000000080), &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 12:48:10 executing program 5: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000580)=0x1) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) connect$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getitimer(0x0, &(0x7f0000000300)) socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/160, 0xa0}, 0x120) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/loop#\x00'}, 0x10) getpid() getegid() getuid() 12:48:10 executing program 4: r0 = socket$inet6(0xa, 0x2000000802, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) 12:48:10 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) [ 1493.521521] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 12:48:10 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) writev(r1, &(0x7f0000001400)=[{&(0x7f0000000340)="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", 0x45a}], 0x1) 12:48:10 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:48:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0xfffffffffffff003, 0xffffffff00000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=@bridge_delneigh={0x1c, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0xffffffff00000000}}, 0x1c}}, 0x0) 12:48:11 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:48:11 executing program 4: eventfd(0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clock_gettime(0x0, &(0x7f0000000040)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) pipe2(&(0x7f0000000200), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000440)) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f00000005c0)=0xfffffffffffffd87) getpgrp(0x0) stat(&(0x7f00000009c0)='./file0/../file0\x00', &(0x7f0000000a40)) getgid() gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@dev}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000940)=0xe8) getgid() pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) getuid() getresgid(&(0x7f0000000980), &(0x7f0000000340), &(0x7f0000000580)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f0000000440)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0956969ef69dc00d99069203737c3397c2a450f01d60f38211ac4c207dd2bf3f3a70f157a9e400f01ef640f1b7996417545c462010d42002e1a1a3ef0d7f65855010131a3b786e2989fc4227992749f55") sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) syz_execute_func(&(0x7f0000000180)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c560044315466141a1a01bf64ac1e5d31a3b786e2989f7f") 12:48:11 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) 12:48:11 executing program 3: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:11 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00'}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:48:11 executing program 4: sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) getpid() wait4(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') epoll_create(0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) stat(&(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000740)) geteuid() lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f00000012c0)) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)={@remote}, &(0x7f00000005c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@local, @rand_addr}, &(0x7f0000000800)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000440)={0x0, @broadcast, @multicast1}, &(0x7f0000000400)=0x34913745b4ee72ac) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@dev, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000c80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000dc0)={'lo\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001000)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001040)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000001140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001180)={'ipddp0\x00'}) getsockname(0xffffffffffffffff, &(0x7f00000011c0)=@hci, &(0x7f0000001240)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001540)={{{@in6=@local, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000001640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001700)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000480), 0xc, &(0x7f0000001d00)={&(0x7f0000001800)=ANY=[]}}, 0x0) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001340)={{{@in6=@remote, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000001440)=0xe8) lstat(&(0x7f00000017c0)='./file0/file0\x00', &(0x7f0000000cc0)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 12:48:11 executing program 5: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000580)=0x1) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) connect$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getitimer(0x0, &(0x7f0000000300)) socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/160, 0xa0}, 0x120) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/loop#\x00'}, 0x10) getpid() getegid() getuid() 12:48:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000000140), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv4_getnetconf={0x14, 0x52, 0x311}, 0x14}}, 0x0) 12:48:11 executing program 3: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:11 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:48:11 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:48:11 executing program 3: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:11 executing program 2: eventfd(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0a10fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) 12:48:12 executing program 3: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:12 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:48:12 executing program 3: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) socket$inet6(0xa, 0x803, 0x3) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:12 executing program 5: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000580)=0x1) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) connect$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getitimer(0x0, &(0x7f0000000300)) socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/160, 0xa0}, 0x120) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/loop#\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000940)=0xe8) getegid() getuid() 12:48:12 executing program 4: sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) getpid() wait4(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000300)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') epoll_create(0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) stat(&(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000740)) geteuid() lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f00000012c0)) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)={@remote}, &(0x7f00000005c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@local, @rand_addr}, &(0x7f0000000800)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000440)={0x0, @broadcast, @multicast1}, &(0x7f0000000400)=0x34913745b4ee72ac) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@dev, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000c80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000dc0)={'lo\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001000)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001040)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000001140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001180)={'ipddp0\x00'}) getsockname(0xffffffffffffffff, &(0x7f00000011c0)=@hci, &(0x7f0000001240)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001540)={{{@in6=@local, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f00000014c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000001640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001700)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000480), 0xc, &(0x7f0000001d00)={&(0x7f0000001800)=ANY=[]}}, 0x0) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001340)={{{@in6=@remote, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000001440)=0xe8) lstat(&(0x7f00000017c0)='./file0/file0\x00', &(0x7f0000000cc0)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 12:48:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) r1 = getpid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000180)=r1) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") sendto$inet(r0, &(0x7f00000001c0), 0xffffffffffffffe5, 0x200007ff, &(0x7f0000000100)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000300)=')', 0x1, 0x1, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) 12:48:12 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:48:13 executing program 3: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:13 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) r1 = getpid() ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000180)=r1) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") sendto$inet(r0, &(0x7f00000001c0), 0xffffffffffffffe5, 0x200007ff, &(0x7f0000000100)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000300)=')', 0x1, 0x1, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) 12:48:13 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:48:13 executing program 2: eventfd(0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clock_gettime(0x0, &(0x7f0000000040)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) pipe2(&(0x7f0000000200), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000440)) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f00000005c0)=0xfffffffffffffd87) getpgrp(0x0) stat(&(0x7f00000009c0)='./file0/../file0\x00', &(0x7f0000000a40)) getgid() gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@dev}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000940)=0xe8) getgid() pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) getuid() getresgid(&(0x7f0000000980), &(0x7f0000000340), &(0x7f0000000580)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f0000000440)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0956969ef69dc00d99069203737c3397c2a450f01d60f38211ac4c207dd2bf3f3a70f157a9e400f01ef640f1b7996417545c462010d42002e1a1a3ef0d7f65855010131a3b786e2989fc4227992749f55") sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000000c0)) 12:48:13 executing program 3: socket(0xa, 0x1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:13 executing program 5: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000580)=0x1) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) connect$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getitimer(0x0, &(0x7f0000000300)) socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/160, 0xa0}, 0x120) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/loop#\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000940)=0xe8) getegid() getuid() 12:48:13 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'team_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @rand_addr}]}, 0x20}}, 0x0) 12:48:13 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:48:13 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x10b}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x10b}, 0x1c) 12:48:13 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x4, &(0x7f0000000380), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'erspan0\x00', 0x1}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000593000)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000001c0)={'erspan0\x00'}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) 12:48:13 executing program 3: socket(0xa, 0x1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:14 executing program 4: prctl$setname(0xf, &(0x7f00000003c0)="2f6465762f6d6964692305aa9f527a5af79424c119705b2bcaab29dcc355b35e") rt_sigaction(0x0, &(0x7f0000000140)={&(0x7f0000000040)="66470f3a0aa0f63f0000e43e67663e417fbb3ef30fb8acc30d000000460fc314a26766420fd0948fd6be0000f30f1b37f20f2c7c6bcb66410f69fb1978ffc46141580ce2", {}, 0x0, &(0x7f00000000c0)="8fa9280177e465450fd46a69f30fd6dff3ab6584f9c423056d6ce007e70fc5d7ffc462259aa800100002660f3a442869c46155159bfeefffff"}, &(0x7f0000000200)={&(0x7f0000000180)="c4a27934fe3e46dde1c4e3357a6674f70fe7a605000000663641d9f3c4c1fc5a152e000000c461f8523f670f0f88710000000df20f79d2c4e2159174ff00", {}, 0x0, &(0x7f00000001c0)="c4e17c290e2e672e3e66470ff7e8c46219bc8600000000c4a2790fb03b000000c4623528960d000000c48261dd1044d9d0c4417ddbc71cd0a4"}, 0x8, &(0x7f0000000240)) pipe2(&(0x7f0000000740), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@dev}}, {{}, 0x0, @in6}}, &(0x7f00000008c0)=0xe8) getresgid(&(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000980)) fchownat(0xffffffffffffffff, &(0x7f0000000780)='./file1\x00', 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='personality\x00') ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="f942805da0690a0d43eece41ff0fa4373766430f78c7070343c84f0019c462fd1e28a6c4e1d012e45ff8b87545d745c945c9c4010d8e64ac1e5731a3b7b74379dfb9d6adbe90dfe25c4b8967") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@remote, @in=@dev}}, {{@in=@multicast2}}}, &(0x7f0000000300)=0xe8) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400)) 12:48:14 executing program 3: socket(0xa, 0x1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:14 executing program 2: eventfd(0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clock_gettime(0x0, &(0x7f0000000040)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) pipe2(&(0x7f0000000200), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000440)) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f00000005c0)=0xfffffffffffffd87) getpgrp(0x0) stat(&(0x7f00000009c0)='./file0/../file0\x00', &(0x7f0000000a40)) getgid() gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@dev}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000940)=0xe8) getgid() pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) getuid() getresgid(&(0x7f0000000980), &(0x7f0000000340), &(0x7f0000000580)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f0000000440)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0956969ef69dc00d99069203737c3397c2a450f01d60f38211ac4c207dd2bf3f3a70f157a9e400f01ef640f1b7996417545c462010d42002e1a1a3ef0d7f65855010131a3b786e2989fc4227992749f55") sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000000c0)) 12:48:14 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000001600)=ANY=[@ANYBLOB="0cf30002000000000000000000000000"], 0x10}}], 0x1, 0x0) 12:48:14 executing program 5: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000580)=0x1) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) connect$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getitimer(0x0, &(0x7f0000000300)) socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/160, 0xa0}, 0x120) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/loop#\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000940)=0xe8) getegid() getuid() 12:48:14 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:14 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req={0x0, 0x0, 0x0, 0x1}, 0xffffffffffffff0a) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x81, &(0x7f0000000080), 0x0, &(0x7f0000000000)}}, {{&(0x7f0000000280)=@in6={0xa, 0x0, 0x4, @loopback}, 0x80, &(0x7f0000000080), 0x1, &(0x7f0000000000), 0x142}}], 0x2, 0x0) 12:48:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:14 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:48:14 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000f40)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000fc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001600)={{{@in=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001700)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001740)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000001840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000018c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001940)={'lo\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001980)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001e40)={{{@in6=@local, @in6=@ipv4}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001f40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002040)={{{@in6=@ipv4={[], [], @dev}, @in6}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000002140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000022c0)={'sit0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000026c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002740)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002800), &(0x7f0000002840)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000002880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000028c0)=0x14, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000002900), &(0x7f0000002940)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002a40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002a80)={{{@in=@local, @in6=@ipv4}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000002b80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002bc0)={{{@in=@broadcast, @in6}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000002cc0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002d40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002d80)={{{@in=@broadcast, @in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000002e80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002fc0)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003000)={{{@in=@broadcast, @in=@local}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000003100)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003140)={{{@in6=@ipv4={[], [], @local}, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000003240)=0xe8) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003680)={&(0x7f0000003500)=@ll, 0x80, &(0x7f0000003580), 0x0, &(0x7f00000035c0)=""/142, 0x8e}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000036c0)={'team0\x00'}) clock_gettime(0x0, &(0x7f0000008c40)) recvmmsg(0xffffffffffffffff, &(0x7f0000008a40), 0x0, 0x0, &(0x7f0000008c80)) accept$packet(0xffffffffffffff9c, &(0x7f0000008dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008e00)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000008e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000008e80)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000008ec0)={{{@in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000008fc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000090c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000009100)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000009140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000091c0)={@dev}, &(0x7f0000009200)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000d380)={0x0, @multicast1, @dev}, &(0x7f000000d3c0)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f000000df80)={&(0x7f0000000f00), 0xc, &(0x7f000000df40)={&(0x7f0000009240)=ANY=[]}}, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000003bc0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000003c00)) signalfd4(0xffffffffffffffff, &(0x7f0000003c40), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) ioprio_set$uid(0x0, 0x0, 0x0) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/rtc0\x00', 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) fstat(0xffffffffffffffff, &(0x7f0000000040)) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000380)) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)) fstat(0xffffffffffffffff, &(0x7f0000000500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000880)=0xc) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f00000008c0)={0x1f, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1, '!'}}, 0x1f) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000840)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) 12:48:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:15 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000006a80)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x207) 12:48:15 executing program 3: r0 = socket(0x0, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:15 executing program 2: getcwd(&(0x7f0000003500)=""/4096, 0x12b9) socketpair(0x0, 0x0, 0x0, &(0x7f0000000380)) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000000c0)={'NETMAP\x00'}, &(0x7f0000000140)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000200)=""/133) syz_execute_func(&(0x7f0000000480)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5c4a2b54564f46c800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000001c0)) getgid() getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)=""/4096, &(0x7f0000000180)=0x1000) 12:48:15 executing program 5: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000580)=0x1) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) connect$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getitimer(0x0, &(0x7f0000000300)) socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/160, 0xa0}, 0x120) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000940)=0xe8) getegid() getuid() 12:48:15 executing program 3: r0 = socket(0x0, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:15 executing program 3: r0 = socket(0x0, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:15 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:48:15 executing program 3: r0 = socket(0xa, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:15 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'icmp6\x00'}, &(0x7f0000000080)=0x1e) 12:48:15 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bond0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1}, 0x14) 12:48:15 executing program 3: r0 = socket(0xa, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:15 executing program 3: r0 = socket(0xa, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:16 executing program 3: socket(0xa, 0x1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:16 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/25, 0x19}], 0x1) sendto$inet6(r0, &(0x7f0000000040), 0x2df, 0x0, &(0x7f00000000c0), 0x1c) 12:48:16 executing program 1: clock_getres(0x6, &(0x7f0000000040)) ustat(0x0, &(0x7f0000000680)) syz_extract_tcp_res$synack(&(0x7f00000002c0), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_getres(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") memfd_create(&(0x7f0000000080)='\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000340)) gettid() geteuid() getgid() fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000500)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000780)=""/158, 0x9e}) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) getgid() socket$alg(0x26, 0x5, 0x0) pipe2(&(0x7f0000000600), 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000300), 0x0, &(0x7f0000000700)=ANY=[]}, 0x0) 12:48:16 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, 0x44, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000100)='bond0\x00'}) 12:48:16 executing program 5: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000580)=0x1) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) connect$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getitimer(0x0, &(0x7f0000000300)) socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/160, 0xa0}, 0x120) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000940)=0xe8) getegid() getuid() 12:48:16 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:48:16 executing program 3: socket(0xa, 0x1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:16 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400add427323b470c458c560a067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffeffe809000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 12:48:16 executing program 4: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0x1, 0x4) sendmsg(r0, &(0x7f0000000180)={&(0x7f0000000100)=@in6={0xa, 0x4e24, 0x800, @dev}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=[{0x18, 0x0, 0x0, "f1"}], 0x18, 0xfffffffffffffffd}, 0x0) 12:48:16 executing program 3: socket(0xa, 0x1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:16 executing program 2: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:48:17 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000080)={'bond_slave_0\x00', @ifru_map={0x401, 0xea, 0x80000001, 0x80a, 0x10001, 0x8}}) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000040)=0x80, 0x4) 12:48:17 executing program 3: r0 = socket(0xa, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:17 executing program 3: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x0, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:17 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000180)={0x0, 0x8, 0x9, 0x0, 0x0, 0x6}) keyctl$get_security(0x11, 0x0, &(0x7f00000002c0)=""/165, 0xa5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = getpid() ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000080)={{0x0, 0x0, 0x7, 0x3, 0x8}}) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000240)=@ethtool_dump={0x40}}) lremovexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)=@random={'system.', 'nodevvboxnet1\'usercpusetuser\x00'}) 12:48:17 executing program 4: r0 = socket(0x200000000010, 0x40000000000003, 0x0) geteuid() clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c03, 0xffffffffffffffff) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f00000000c0)={'sit0\x00', @ifru_data=&(0x7f0000000000)="983c511bed1abdf9defd999cf30ae0e17575cf1eea48d067761b0982527c26b4"}) 12:48:17 executing program 2: syz_extract_tcp_res$synack(&(0x7f0000000300), 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x6000, 0x10000, 0x0, &(0x7f0000fec000/0x10000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f0000000040)='posix_acl_accesssystemp\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000080)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000480)=""/137) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000200)={0x0, 'ip6tnl0\x00'}, 0x18) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000c00)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000840)='nbd\x00'}, 0x30) getuid() syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000b40)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003140)={@mcast1}, &(0x7f0000003180)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003340)={'lo\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000003380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000033c0)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000003400), &(0x7f0000003440)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000003480)=@xdp, &(0x7f0000003500)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000003540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003580)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000003600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003640)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000052c0)={0x0, @local, @loopback}, &(0x7f0000005300)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005380)={{{@in=@remote, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000005480)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000005840)={&(0x7f0000000240), 0xc, &(0x7f0000005800)={&(0x7f00000054c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) getpgid(0x0) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 12:48:17 executing program 3: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x0, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:17 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:48:17 executing program 5: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000580)=0x1) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) connect$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getitimer(0x0, &(0x7f0000000300)) socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/160, 0xa0}, 0x120) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000940)=0xe8) getegid() getuid() 12:48:17 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000000019, &(0x7f0000548000)=0x4001, 0x4) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffffffffffceb, 0x0, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c) sendto$inet6(r1, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e21}, 0x1c) recvmsg(r1, &(0x7f0000000400)={&(0x7f00000001c0)=@nl=@proc, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000080)=""/36, 0x24}, 0x2000) 12:48:17 executing program 3: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x0, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:17 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000b80)=@deltclass={0x24, 0x29, 0x201, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 12:48:17 executing program 3: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00'}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:17 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000000), 0x1a7dba7462cc747, 0x0) connect$unix(r1, &(0x7f00002ffff6)=@file={0x0, './file0\x00'}, 0xa) poll(&(0x7f0000000000)=[{r0, 0x100}], 0x1, 0x3) 12:48:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000012c0)={&(0x7f0000000000), 0xc, &(0x7f0000001280)={&(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000001800120008000100736974000c00020008000400e26290d48930845bd28e6869d7eafa06db259e55c91437cab56a8a7c1dc92d7990234b81a51410e7ae792653901c4ab796b7ed031bb1ddbf15120164543bf0baf4712e76f82ced892cece1605f65115af3668ae95ace07929dc683ac8452ce8f44d915d49e50f6976918c018af044295d26ae5e3845c9da0d19712ff0597712aa70a5653b9e0ddbc661ef05d1edec875", @ANYRES32=0x0], 0x2}}, 0x0) 12:48:18 executing program 3: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00'}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:18 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x401) r0 = socket$netlink(0x10, 0x3, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x300, &(0x7f0000000000), 0xffffffffffffff0a) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000180), 0x4) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{}]}) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000240)) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000001c0)=""/16) 12:48:18 executing program 2: syz_extract_tcp_res$synack(&(0x7f0000000300), 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x6000, 0x10000, 0x0, &(0x7f0000fec000/0x10000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f0000000040)='posix_acl_accesssystemp\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000080)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000480)=""/137) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000200)={0x0, 'ip6tnl0\x00'}, 0x18) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000c00)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000840)='nbd\x00'}, 0x30) getuid() syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000b40)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003140)={@mcast1}, &(0x7f0000003180)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003340)={'lo\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000003380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000033c0)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000003400), &(0x7f0000003440)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000003480)=@xdp, &(0x7f0000003500)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000003540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003580)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000003600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003640)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000052c0)={0x0, @local, @loopback}, &(0x7f0000005300)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005380)={{{@in=@remote, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000005480)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000005840)={&(0x7f0000000240), 0xc, &(0x7f0000005800)={&(0x7f00000054c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) getpgid(0x0) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 12:48:18 executing program 3: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00'}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x5}]}, 0x20}}, 0x0) 12:48:18 executing program 1: r0 = socket(0x200000000010, 0x40000000000003, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c03, r0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000040)={0xeb2}, 0x4) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f00000000c0)={'sit0\x00', @ifru_data=&(0x7f0000000000)="983c511bed1abdf9defd999cf30ae0e17575cf1eea48d067761b0982527c26b4"}) 12:48:18 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:48:18 executing program 5: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000580)=0x1) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) connect$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getitimer(0x0, &(0x7f0000000300)) socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/loop#\x00'}, 0x10) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000940)=0xe8) getegid() getuid() 12:48:18 executing program 1: syz_open_procfs$namespace(0x0, 0xffffffffffffffff) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000001740)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000001780)=0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000009440), 0x0, 0x0, &(0x7f0000009680)={0x77359400}) futex(&(0x7f0000000480), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000004c0), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f7899c4e2192cbfc0e694187beefafa2179660f38302f4175450f2e1a400fbcc1c44379dfb9d6adbe90df470ff985feefffff9f3f") 12:48:18 executing program 3: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x18, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) 12:48:18 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$setregset(0x4205, r1, 0x203, &(0x7f0000000180)={&(0x7f0000000140)}) fcntl$lock(r0, 0x7, &(0x7f0000000080)) r2 = getpid() openat$cgroup_ro(r0, &(0x7f0000000040)='memory.swap.current\x00', 0x0, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000000)) fcntl$setlease(r0, 0x400, 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00', 0x1ff}, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000300), 0x0, [], [0x0, 0x0, 0x6]}) 12:48:18 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() setrlimit(0x7, &(0x7f0000000000)) sched_setscheduler(r0, 0x0, &(0x7f0000000c80)) r1 = eventfd2(0x0, 0x80001) ioctl$FS_IOC_GETVERSION(r1, 0x80047601, &(0x7f00000000c0)) 12:48:18 executing program 3: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x18, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) 12:48:18 executing program 4: eventfd(0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) clock_gettime(0x0, &(0x7f0000000040)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) pipe2(&(0x7f0000000200), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000440)) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f00000005c0)=0xfffffffffffffd87) getpgrp(0x0) stat(&(0x7f00000009c0)='./file0/../file0\x00', &(0x7f0000000a40)) getgid() gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @local}, @in=@dev}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000940)=0xe8) getgid() pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) getuid() getresgid(&(0x7f0000000980), &(0x7f0000000340), &(0x7f0000000580)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f0000000440)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0956969ef69dc00d99069203737c3397c2a450f01d60f38211ac4c207dd2bf3f3a70f157a9e400f01ef640f1b7996417545c462010d42002e1a1a3ef0d7f65855010131a3b786e2989fc4227992749f55") sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000980)}, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000180)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c560044315466141a1a01bf64ac1e5d31a3b786e2989f7f") utime(&(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000300)) 12:48:18 executing program 3: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x18, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}}, 0x18}}, 0x0) 12:48:19 executing program 2: syz_extract_tcp_res$synack(&(0x7f0000000300), 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x6000, 0x10000, 0x0, &(0x7f0000fec000/0x10000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f0000000040)='posix_acl_accesssystemp\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000080)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000480)=""/137) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000200)={0x0, 'ip6tnl0\x00'}, 0x18) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000c00)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000840)='nbd\x00'}, 0x30) getuid() syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000b40)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003140)={@mcast1}, &(0x7f0000003180)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003340)={'lo\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000003380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000033c0)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000003400), &(0x7f0000003440)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000003480)=@xdp, &(0x7f0000003500)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000003540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003580)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000003600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003640)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000052c0)={0x0, @local, @loopback}, &(0x7f0000005300)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005380)={{{@in=@remote, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000005480)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000005840)={&(0x7f0000000240), 0xc, &(0x7f0000005800)={&(0x7f00000054c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) getpgid(0x0) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 12:48:19 executing program 3: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @rand_addr}]}, 0x20}}, 0x0) 12:48:19 executing program 5: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000580)=0x1) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) connect$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getitimer(0x0, &(0x7f0000000300)) socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/loop#\x00'}, 0x10) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000940)=0xe8) getegid() getuid() 12:48:19 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:48:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) accept(0xffffffffffffffff, &(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x80) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x4800000000000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="000000000000000008001b00000000000800100006000000"], 0x1}}, 0x0) 12:48:19 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) r1 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x3, 0x0) dup3(r0, r1, 0x80000) 12:48:20 executing program 3: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @rand_addr}]}, 0x20}}, 0x0) 12:48:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000004c0)="ad56b13406419de645499a9255b6cc0400aeb9060089afc35400c2", 0x1b) 12:48:20 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, 0x44, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)='bond0\x00'}) 12:48:20 executing program 4: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f00000003c0)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) fchmod(0xffffffffffffffff, 0x0) getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000440)) dup(0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0) prctl$void(0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) init_module(&(0x7f0000000300)='/dev/rtc0\x00', 0xa, &(0x7f0000000340)=',ppp1\x00') openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000004c0)=0x14, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") [ 1503.404755] IPVS: ftp: loaded support on port[0] = 21 12:48:20 executing program 3: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @rand_addr}]}, 0x20}}, 0x0) 12:48:20 executing program 5: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000580)=0x1) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) connect$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getitimer(0x0, &(0x7f0000000300)) socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/loop#\x00'}, 0x10) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000940)=0xe8) getegid() getuid() 12:48:20 executing program 2: syz_extract_tcp_res$synack(&(0x7f0000000300), 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x6000, 0x10000, 0x0, &(0x7f0000fec000/0x10000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f0000000040)='posix_acl_accesssystemp\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000080)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000480)=""/137) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000200)={0x0, 'ip6tnl0\x00'}, 0x18) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000c00)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000840)='nbd\x00'}, 0x30) getuid() syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000b40)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003140)={@mcast1}, &(0x7f0000003180)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003340)={'lo\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000003380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000033c0)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000003400), &(0x7f0000003440)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000003480)=@xdp, &(0x7f0000003500)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000003540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003580)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000003600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003640)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000052c0)={0x0, @local, @loopback}, &(0x7f0000005300)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005380)={{{@in=@remote, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000005480)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000005840)={&(0x7f0000000240), 0xc, &(0x7f0000005800)={&(0x7f00000054c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) getpgid(0x0) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 12:48:20 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000140)={@link_local, @dev, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x34}, @rand_addr=0x80000000, {[@timestamp={0x44, 0x8, 0x5, 0x0, 0x0, [{}]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x81000000, 0x5}}}}}}, &(0x7f0000000040)) 12:48:20 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:48:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r1, &(0x7f00007af000)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 12:48:21 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00005b1ffc), 0x4) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)='\a', 0x1, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in=@dev, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) 12:48:21 executing program 5: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000580)=0x1) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) connect$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getitimer(0x0, &(0x7f0000000300)) socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/160, 0xa0}, 0x120) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/loop#\x00'}, 0x10) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000940)=0xe8) getegid() getuid() 12:48:21 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:48:22 executing program 2: syz_extract_tcp_res$synack(&(0x7f0000000300), 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x6000, 0x10000, 0x0, &(0x7f0000fec000/0x10000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f0000000040)='posix_acl_accesssystemp\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000080)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000480)=""/137) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000200)={0x0, 'ip6tnl0\x00'}, 0x18) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000c00)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000840)='nbd\x00'}, 0x30) getuid() syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000b40)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003140)={@mcast1}, &(0x7f0000003180)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003340)={'lo\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000003380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000033c0)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000003400), &(0x7f0000003440)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000003480)=@xdp, &(0x7f0000003500)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000003540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003580)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000003600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003640)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000052c0)={0x0, @local, @loopback}, &(0x7f0000005300)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005380)={{{@in=@remote, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000005480)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000005840)={&(0x7f0000000240), 0xc, &(0x7f0000005800)={&(0x7f00000054c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) getpgid(0x0) 12:48:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000002000)=[{{&(0x7f0000001c00)=@in={0x2, 0x4e23, @broadcast}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="1c0000000000000007000000d90f9ee6a9d98ab6702e33b94c0000008fc8eaa0170e244d1fca59d5379e257328131556106899fe6ebd1e6913ee2be7c170fcbdf1f58023c2195a9414bb3be5d3866a4d7bfa6eaf8c5558a46feba80039556ed23138f71db15545496a18fedf11cbed029cefaac61b29d52f1ab4bcc4c13c885542e7c1965daa6047114e72cb07c333cdbb4336144a4b7fcdda72a89e8d74976e163e1663dac5fbf1c5e09bbbc344a16634a28b6ad5cfe93db8de09af1d2cb5f7fba847340c008a"], 0xc7}}], 0x1, 0x0) [ 1506.480182] device bridge_slave_1 left promiscuous mode [ 1506.485749] bridge0: port 2(bridge_slave_1) entered disabled state [ 1506.530545] device bridge_slave_0 left promiscuous mode [ 1506.536022] bridge0: port 1(bridge_slave_0) entered disabled state [ 1508.524903] team0 (unregistering): Port device team_slave_1 removed [ 1508.534698] team0 (unregistering): Port device team_slave_0 removed [ 1508.546477] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1508.594108] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1508.650064] bond0 (unregistering): Released all slaves [ 1508.747812] bridge0: port 1(bridge_slave_0) entered blocking state [ 1508.754245] bridge0: port 1(bridge_slave_0) entered disabled state [ 1508.761461] device bridge_slave_0 entered promiscuous mode [ 1508.792494] bridge0: port 2(bridge_slave_1) entered blocking state [ 1508.798930] bridge0: port 2(bridge_slave_1) entered disabled state [ 1508.806204] device bridge_slave_1 entered promiscuous mode [ 1508.834001] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1508.860878] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1508.944160] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1508.988922] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1509.196698] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1509.204582] team0: Port device team_slave_0 added [ 1509.248245] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1509.255843] team0: Port device team_slave_1 added [ 1509.301945] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1509.351253] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1509.398795] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1509.406054] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1509.424222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1509.461841] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1509.468960] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1509.486483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1509.941323] bridge0: port 2(bridge_slave_1) entered blocking state [ 1509.947717] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1509.954431] bridge0: port 1(bridge_slave_0) entered blocking state [ 1509.960836] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1509.968428] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1510.861484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1512.190692] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1512.201730] device bridge_slave_1 left promiscuous mode [ 1512.207282] bridge0: port 2(bridge_slave_1) entered disabled state [ 1512.260629] device bridge_slave_0 left promiscuous mode [ 1512.266494] bridge0: port 1(bridge_slave_0) entered disabled state [ 1514.228897] team0 (unregistering): Port device team_slave_1 removed [ 1514.239051] team0 (unregistering): Port device team_slave_0 removed [ 1514.251347] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1514.294058] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1514.371035] bond0 (unregistering): Released all slaves [ 1514.495076] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1514.613171] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1514.619346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1514.630112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1514.778941] 8021q: adding VLAN 0 to HW filter on device team0 12:48:33 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) 12:48:33 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) poll(&(0x7f0000000100)=[{r0}], 0x84, 0x0) 12:48:33 executing program 2: syz_extract_tcp_res$synack(&(0x7f0000000300), 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x6000, 0x10000, 0x0, &(0x7f0000fec000/0x10000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f0000000040)='posix_acl_accesssystemp\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000080)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000480)=""/137) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000200)={0x0, 'ip6tnl0\x00'}, 0x18) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000c00)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000840)='nbd\x00'}, 0x30) getuid() syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000b40)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003140)={@mcast1}, &(0x7f0000003180)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003340)={'lo\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000003380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000033c0)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000003400), &(0x7f0000003440)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000003480)=@xdp, &(0x7f0000003500)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000003540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003580)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000003600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003640)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000052c0)={0x0, @local, @loopback}, &(0x7f0000005300)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005380)={{{@in=@remote, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000005480)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000005840)={&(0x7f0000000240), 0xc, &(0x7f0000005800)={&(0x7f00000054c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) getpgid(0x0) 12:48:33 executing program 5: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000580)=0x1) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) connect$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getitimer(0x0, &(0x7f0000000300)) socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/160, 0xa0}, 0x120) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/loop#\x00'}, 0x10) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000940)=0xe8) getegid() getuid() 12:48:33 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) accept4(0xffffffffffffffff, &(0x7f000000b540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b5c0)=0x80, 0x0) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:48:33 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)="2e2f6367726f75702e6370752f008ff9bf809e961d36f4c738142db50b39ca1bc4c067901336f2225a69b44ba5937e519d0c840ec9b0476223e56d2316121e319d", 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='cpuset.effective_cpus\x00', 0x2761, 0x0) 12:48:33 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='bond_slave_1\x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) 12:48:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000180)=0x10000000000062) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000240)) r2 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) 12:48:33 executing program 3: futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f0000000180)={0x77359400}, &(0x7f0000000080), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="463592f2ffff8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a7c4c17d7f40bf400f01efe5e57d0fececc4222dbfe801460ff3440f88b500000031a3b786e6989f") [ 1516.832779] IPVS: ftp: loaded support on port[0] = 21 12:48:34 executing program 2: syz_extract_tcp_res$synack(&(0x7f0000000300), 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x6000, 0x10000, 0x0, &(0x7f0000fec000/0x10000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f0000000040)='posix_acl_accesssystemp\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000080)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000480)=""/137) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000200)={0x0, 'ip6tnl0\x00'}, 0x18) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000c00)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000840)='nbd\x00'}, 0x30) getuid() syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000b40)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003140)={@mcast1}, &(0x7f0000003180)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003340)={'lo\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000003380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000033c0)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000003400), &(0x7f0000003440)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000003480)=@xdp, &(0x7f0000003500)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000003540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003580)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000003600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003640)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000052c0)={0x0, @local, @loopback}, &(0x7f0000005300)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005380)={{{@in=@remote, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000005480)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000005840)={&(0x7f0000000240), 0xc, &(0x7f0000005800)={&(0x7f00000054c0)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) getpgid(0x0) 12:48:34 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x7) socket$nl_route(0x10, 0x3, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in, @in6}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @remote, @loopback}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@multicast2, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'veth1_to_bridge\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'bond_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001140)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @multicast2}, &(0x7f00000011c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@ipv4, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009cc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009dc0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@loopback}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009ec0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009f00)={{{@in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f000000a000)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a040)={{{@in6=@dev, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000a140)=0xe8) accept4(0xffffffffffffffff, &(0x7f000000b480)=@hci, &(0x7f000000b500)=0x80, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b600)={@loopback, @loopback}, &(0x7f000000b640)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000b680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b6c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000b740), &(0x7f000000b780)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f000000b7c0)={@local, @remote}, &(0x7f000000b800)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000b840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b880)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000f900)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f000000fa00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000104c0)={&(0x7f00000004c0), 0xc, &(0x7f0000010480)={&(0x7f000000fa40)=ANY=[]}}, 0x0) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002000)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002080)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000002100)=0x1b6) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002280)=0x3a1) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 12:48:34 executing program 5: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000580)=0x1) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/protocols\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) connect$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getitimer(0x0, &(0x7f0000000300)) socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/160, 0xa0}, 0x120) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/loop#\x00'}, 0x10) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000940)=0xe8) getegid() getuid() 12:48:34 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bridge\x00'}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="080002003967cf0a9b09922b8ea00c8fa307514f2093ecffac3078976b41c7827ab5b61296443e8429249bf336f0f7945943a56136d21c6a29f4fb14a4cc041a1a0c30244a4685ea717e5257d409"], 0x1}}, 0x0) 12:48:34 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$LOOP_CHANGE_FD(r0, 0x125f, 0xffffffffffffffff) 12:48:34 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000000)=0x5a2924188116399b) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x81, &(0x7f0000000080), 0x0, &(0x7f0000000000)}}, {{&(0x7f0000000280)=@in6={0xa, 0x0, 0x4, @loopback}, 0x80, &(0x7f0000000080), 0x1, &(0x7f0000000000), 0x142}}], 0x2, 0x0) 12:48:34 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000ac5000), 0x4) sendmmsg$unix(r1, &(0x7f0000000000), 0x1a7dba7462cc747, 0x0) connect$unix(r1, &(0x7f00002ffff6)=@file={0x0, './file0\x00'}, 0xa) close(r0) 12:48:35 executing program 3: pipe(&(0x7f0000000800)) sysinfo(&(0x7f0000000840)=""/245) accept(0xffffffffffffffff, &(0x7f0000000040)=@hci, &(0x7f00000000c0)=0x80) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000001c0), 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000300), &(0x7f0000000340), 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000440), &(0x7f0000000480), 0x0, 0xfffffffffffffffc) socket$inet6_udp(0xa, 0x2, 0x0) keyctl$link(0x8, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) getpgid(0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) getpid() close(0xffffffffffffffff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000340), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@remote, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000380)=0xe8) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180), &(0x7f0000000280)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000001c0)) chroot(&(0x7f0000000080)='./file0\x00') umount2(&(0x7f0000000040)='./file0\x00', 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.subtree_control\x00', 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000003c0)='trusted.overlay.nlink\x00', &(0x7f00000007c0)={'U+', 0x9}, 0x28, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000500)) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f0000000180)={0x0, 0x0, 0x0, 0xdd, &(0x7f00000006c0)=""/221, 0x6d, &(0x7f0000000480)=""/109, 0x1000, &(0x7f0000000940)=""/4096}) syz_execute_func(&(0x7f0000000540)="42805da0c60fef69dc8f8878ccd7fece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271bffb0703") [ 1518.091723] kasan: CONFIG_KASAN_INLINE enabled [ 1518.096709] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1518.158955] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1518.165242] CPU: 1 PID: 15139 Comm: syz-executor3 Not tainted 4.19.0-rc3-next-20180913+ #73 [ 1518.173879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1518.183286] RIP: 0010:reconfigure_super+0x48e/0xbb0 [ 1518.188336] Code: 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 62 05 00 00 48 ba 00 00 00 00 00 fc ff df 48 8b 03 48 8d 78 30 48 89 f9 48 c1 e9 03 <80> 3c 11 00 0f 85 4d 05 00 00 48 8b 40 30 48 85 c0 48 89 85 20 ff [ 1518.202319] kobject: 'vcan0' (00000000bbfbf120): kobject_add_internal: parent: 'net', set: 'devices' [ 1518.207341] RSP: 0018:ffff8801287d78d8 EFLAGS: 00010206 [ 1518.207355] RAX: 0000000000000000 RBX: ffff8801287d79f8 RCX: 0000000000000006 [ 1518.207364] RDX: dffffc0000000000 RSI: ffffffff81cdbc5b RDI: 0000000000000030 [ 1518.207378] RBP: ffff8801287d79c8 R08: ffff8801b8d68700 R09: fffffbfff12c24e5 [ 1518.234521] kobject: 'vcan0' (00000000bbfbf120): kobject_uevent_env [ 1518.236876] R10: fffffbfff12c24e5 R11: ffffffff8961272b R12: ffff880126e54bc0 [ 1518.236885] R13: 1ffff100250faf20 R14: 0000000000000000 R15: ffff8801287d7adc [ 1518.236898] FS: 00007f0727ab5700(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 1518.236912] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1518.256433] kobject: 'vcan0' (00000000bbfbf120): fill_kobj_path: path = '/devices/virtual/net/vcan0' [ 1518.257973] CR2: 00007f0727a93db8 CR3: 0000000133eba000 CR4: 00000000001406e0 [ 1518.257986] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1518.257994] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1518.258004] Call Trace: [ 1518.275246] kobject: 'queues' (00000000e6ad8979): kobject_add_internal: parent: 'vcan0', set: '' [ 1518.279506] ? user_get_super+0x250/0x250 [ 1518.279598] ? down_write+0x8a/0x130 [ 1518.279617] ? do_umount_root+0x218/0x320 [ 1518.304409] kobject: 'queues' (00000000e6ad8979): kobject_uevent_env [ 1518.310710] ? down_read+0x120/0x120 [ 1518.310731] do_umount_root+0x2b1/0x320 [ 1518.310744] ? namespace_unlock+0x210/0x210 [ 1518.310766] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1518.320877] kobject: 'queues' (00000000e6ad8979): kobject_uevent_env: filter function caused the event to drop! [ 1518.322839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1518.322860] ? ns_capable_common+0x13f/0x170 [ 1518.330240] kobject: 'rx-0' (000000003065c2d0): kobject_add_internal: parent: 'queues', set: 'queues' [ 1518.330730] ksys_umount+0x8b6/0x1230 [ 1518.334952] kobject: 'rx-0' (000000003065c2d0): kobject_uevent_env [ 1518.341370] ? rcu_softirq_qs+0x20/0x20 [ 1518.341385] ? dput.part.25+0x241/0x790 [ 1518.341403] ? check_preemption_disabled+0x48/0x200 [ 1518.341421] ? __detach_mounts+0x430/0x430 [ 1518.359794] kobject: 'rx-0' (000000003065c2d0): fill_kobj_path: path = '/devices/virtual/net/vcan0/queues/rx-0' [ 1518.369483] ? rcu_softirq_qs+0x20/0x20 [ 1518.369499] ? mnt_get_count+0x150/0x150 [ 1518.369517] ? dput.part.25+0x26d/0x790 [ 1518.389590] kobject: 'tx-0' (000000004b52d3b2): kobject_add_internal: parent: 'queues', set: 'queues' [ 1518.392696] ? shrink_dcache_sb+0x350/0x350 [ 1518.392711] ? current_umask+0x70/0x70 [ 1518.392729] ? __x64_sys_futex+0x47f/0x6a0 [ 1518.392745] ? do_syscall_64+0x9a/0x820 [ 1518.392764] ? do_syscall_64+0x9a/0x820 [ 1518.403957] kobject: 'tx-0' (000000004b52d3b2): kobject_uevent_env [ 1518.407055] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1518.407073] ? trace_hardirqs_on+0xbd/0x310 [ 1518.407094] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1518.421052] kobject: 'tx-0' (000000004b52d3b2): fill_kobj_path: path = '/devices/virtual/net/vcan0/queues/tx-0' [ 1518.426596] ? trace_hardirqs_off_caller+0x300/0x300 [ 1518.426616] ? ksys_mount+0xa8/0x140 [ 1518.508184] __x64_sys_umount+0x54/0x80 [ 1518.512266] do_syscall_64+0x1b9/0x820 [ 1518.516174] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1518.521553] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1518.526497] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1518.531357] ? trace_hardirqs_off+0x310/0x310 [ 1518.535875] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1518.540908] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1518.545941] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1518.550889] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1518.556091] RIP: 0033:0x4572d9 [ 1518.559302] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1518.578541] RSP: 002b:00007f0727ab4c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 1518.586266] RAX: ffffffffffffffda RBX: 00007f0727ab56d4 RCX: 00000000004572d9 [ 1518.593548] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 1518.600850] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 1518.608192] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1518.615473] R13: 00000000004d7ba8 R14: 00000000004caa53 R15: 0000000000000000 [ 1518.622873] Modules linked in: [ 1518.649913] kobject: 'loop0' (00000000aa9c0914): kobject_uevent_env [ 1518.656542] kobject: 'loop0' (00000000aa9c0914): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1518.664915] ---[ end trace c61bdfe84669f64d ]--- [ 1518.686443] RIP: 0010:reconfigure_super+0x48e/0xbb0 [ 1518.693651] kobject: 'loop5' (0000000042f666a1): kobject_uevent_env [ 1518.707682] kobject: 'bond0' (00000000735b38d0): kobject_add_internal: parent: 'net', set: 'devices' [ 1518.709720] kobject: 'loop5' (0000000042f666a1): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1518.718441] kobject: 'bond0' (00000000735b38d0): kobject_uevent_env [ 1518.733968] Code: 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 62 05 00 00 48 ba 00 00 00 00 00 fc ff df 48 8b 03 48 8d 78 30 48 89 f9 48 c1 e9 03 <80> 3c 11 00 0f 85 4d 05 00 00 48 8b 40 30 48 85 c0 48 89 85 20 ff [ 1518.753447] kobject: 'bond0' (00000000735b38d0): fill_kobj_path: path = '/devices/virtual/net/bond0' [ 1518.769875] kobject: 'queues' (000000008ff6be49): kobject_add_internal: parent: 'bond0', set: '' [ 1518.779482] kobject: 'queues' (000000008ff6be49): kobject_uevent_env [ 1518.791691] RSP: 0018:ffff8801287d78d8 EFLAGS: 00010206 [ 1518.797084] RAX: 0000000000000000 RBX: ffff8801287d79f8 RCX: 0000000000000006 [ 1518.804846] kobject: 'loop2' (00000000a328927f): kobject_uevent_env [ 1518.812212] kobject: 'queues' (000000008ff6be49): kobject_uevent_env: filter function caused the event to drop! [ 1518.822918] kobject: 'loop2' (00000000a328927f): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1518.832970] kobject: 'rx-0' (00000000debdb36d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1518.846697] RDX: dffffc0000000000 RSI: ffffffff81cdbc5b RDI: 0000000000000030 [ 1518.854395] kobject: 'rx-0' (00000000debdb36d): kobject_uevent_env [ 1518.868073] kobject: 'rx-0' (00000000debdb36d): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-0' [ 1518.881784] kobject: 'rx-1' (0000000036c2283a): kobject_add_internal: parent: 'queues', set: 'queues' [ 1518.891500] RBP: ffff8801287d79c8 R08: ffff8801b8d68700 R09: fffffbfff12c24e5 [ 1518.898790] R10: fffffbfff12c24e5 R11: ffffffff8961272b R12: ffff880126e54bc0 [ 1518.906608] kobject: 'rx-1' (0000000036c2283a): kobject_uevent_env [ 1518.913240] kobject: 'rx-1' (0000000036c2283a): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-1' [ 1518.924079] kobject: 'rx-2' (00000000e2487803): kobject_add_internal: parent: 'queues', set: 'queues' [ 1518.929794] R13: 1ffff100250faf20 R14: 0000000000000000 R15: ffff8801287d7adc [ 1518.934133] kobject: 'rx-2' (00000000e2487803): kobject_uevent_env [ 1518.947509] kobject: 'rx-2' (00000000e2487803): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-2' [ 1518.949783] FS: 00007f0727ab5700(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 [ 1518.958635] kobject: 'rx-3' (00000000c9657481): kobject_add_internal: parent: 'queues', set: 'queues' [ 1518.975787] kobject: 'rx-3' (00000000c9657481): kobject_uevent_env [ 1518.979751] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1518.982533] kobject: 'rx-3' (00000000c9657481): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-3' [ 1518.988074] CR2: ffffffffffffffdc CR3: 0000000133eba000 CR4: 00000000001406f0 [ 1518.998948] kobject: 'rx-4' (000000006c066b0d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1519.015868] kobject: 'rx-4' (000000006c066b0d): kobject_uevent_env [ 1519.022554] kobject: 'rx-4' (000000006c066b0d): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-4' [ 1519.029768] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1519.033329] kobject: 'rx-5' (0000000015a9f5a4): kobject_add_internal: parent: 'queues', set: 'queues' [ 1519.049734] kobject: 'rx-5' (0000000015a9f5a4): kobject_uevent_env [ 1519.054504] kasan: CONFIG_KASAN_INLINE enabled [ 1519.056101] kobject: 'rx-5' (0000000015a9f5a4): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-5' [ 1519.070019] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1519.072603] kobject: 'rx-6' (00000000346a9022): kobject_add_internal: parent: 'queues', set: 'queues' [ 1519.078389] Kernel panic - not syncing: Fatal exception [ 1519.087917] kobject: 'rx-6' (00000000346a9022): kobject_uevent_env [ 1519.094324] Kernel Offset: disabled [ 1519.104477] Rebooting in 86400 seconds..