200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:23:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'ip_vti0\x00', 0x4000}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:23:36 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000240)={'bond_slave_1\x00', 0x7}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:23:36 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:23:36 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:23:36 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:23:36 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:23:37 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:23:37 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() 16:23:37 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:23:37 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:23:38 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() 16:23:38 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:23:39 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'ip_vti0\x00', 0x4000}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:23:43 executing program 3: 16:23:43 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:23:43 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:23:43 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() 16:23:43 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:23:44 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:23:44 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:23:44 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:23:44 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:23:44 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:23:45 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:23:46 executing program 4: 16:23:46 executing program 3: 16:23:46 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:23:46 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:23:46 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:23:46 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:23:47 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:23:47 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:23:47 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:23:47 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:23:47 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:23:47 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:23:49 executing program 4: 16:23:49 executing program 3: 16:23:49 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:23:49 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:23:49 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:23:49 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:23:50 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:23:50 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:23:50 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:23:50 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:23:50 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:23:50 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:23:51 executing program 4: 16:23:52 executing program 3: 16:23:52 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:23:52 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:23:52 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:23:52 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:23:52 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:23:52 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:23:52 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:23:52 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:23:53 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:23:53 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:23:54 executing program 4: 16:23:54 executing program 3: 16:23:54 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:23:54 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:23:54 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:23:54 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:23:55 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:23:55 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:23:55 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:23:55 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:23:55 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:23:56 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:23:57 executing program 4: 16:23:57 executing program 3: 16:23:57 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:23:57 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:23:57 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:23:57 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:23:58 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:23:58 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:23:58 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:23:58 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:23:59 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:23:59 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:00 executing program 4: 16:24:00 executing program 3: 16:24:00 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:00 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:00 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:00 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:01 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:01 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:01 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:01 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:02 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:02 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:03 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) close(r0) getsockname(r0, &(0x7f0000001d00)=@xdp, &(0x7f0000001d80)=0x80) 16:24:03 executing program 3: io_setup(0x3, &(0x7f0000000240)=0x0) io_submit(r0, 0x1, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) 16:24:03 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:03 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:03 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:03 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:04 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:04 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:04 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:04 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:05 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:05 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000008000000000"], &(0x7f0000000100)="47504c030000", 0xfb, 0x1000, &(0x7f00000001c0)=""/4096}, 0x48) 16:24:06 executing program 3: syz_open_dev$mice(&(0x7f0000000780)='/dev/input/mice\x00', 0x0, 0x4002) 16:24:06 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:06 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:06 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:06 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:07 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:07 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:07 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:07 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:07 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:08 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:09 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) close(r0) accept4$packet(r0, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000017c0)=0x14, 0x0) 16:24:09 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) close(r0) 16:24:09 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:09 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:09 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:09 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:09 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:09 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:09 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:10 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:10 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:10 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:11 executing program 4: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) clone(0x4002102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f00000001c0)={0x2, 0x0, 0x1, 0x1}) 16:24:11 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) recvfrom(r2, &(0x7f0000000240)=""/81, 0x51, 0x2000, &(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x0, 0x3, 0x2, {0xa, 0x4e20, 0x80, @ipv4={[], [], @multicast2}}}}, 0x80) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f00000003c0)={{0xa, 0x4e24, 0x2, @mcast2}, {0xa, 0x4e21, 0x0, @empty, 0x4}, 0x2, [0x6, 0xa3, 0x3f, 0x8, 0x1, 0x1356, 0x9, 0x9]}, 0x5c) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}) 16:24:11 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:11 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:11 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:11 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:12 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:12 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:12 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:12 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:13 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:13 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:14 executing program 4: socket$unix(0x1, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000040)=@hci, &(0x7f00000000c0)=0x80) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() socket$netlink(0x10, 0x3, 0x18) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) 16:24:14 executing program 3: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000080)={0x6, 0x80000001, 0x20, 0x0, 0x3}) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x4e21, @broadcast}}) inotify_rm_watch(r0, 0x0) 16:24:14 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:14 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:14 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:14 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:15 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:15 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:15 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:15 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:15 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:15 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:16 executing program 4: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)=0x0) sched_setscheduler(r0, 0x0, &(0x7f0000000180)=0xa) creat(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) sendto$inet(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000100)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f00000003c0)={{0xa, 0x4e24, 0x2, @mcast2}, {0xa, 0x4e21, 0x0, @empty, 0x4}, 0x2, [0x6, 0xa3, 0x3f, 0x8, 0x0, 0x1356, 0x0, 0x9]}, 0x5c) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}) 16:24:16 executing program 3: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl(r0, 0x2, &(0x7f00000001c0)) clone(0x4002102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x9, 0x3, 0x5, 0x0, 0x1, 0x9}) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000100)) 16:24:16 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:16 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:16 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:16 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:16 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:16 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:17 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:17 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:17 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:17 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:18 executing program 4: 16:24:20 executing program 3: 16:24:20 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:20 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:20 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:20 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:20 executing program 4: 16:24:21 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:21 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:21 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:21 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:22 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:22 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:23 executing program 3: 16:24:23 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:23 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:23 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:23 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:23 executing program 4: 16:24:23 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:23 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:23 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:24 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:24 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:24 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:25 executing program 3: 16:24:25 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:25 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:25 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:25 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:25 executing program 4: 16:24:26 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:26 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:26 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:26 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:27 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:27 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:28 executing program 3: 16:24:28 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:28 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:28 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:28 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:29 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000100)={0x4, 0x200000022d}) 16:24:29 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:29 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:29 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:29 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:29 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:29 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:30 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"00ac720000000000ec973f820f7c4000", 0x102}) close(r0) 16:24:30 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:30 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:30 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:30 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:32 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000180)) 16:24:32 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:32 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:32 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:32 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:32 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:32 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:36 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 16:24:36 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:36 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:36 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:36 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:36 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x5) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x20000000, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) recvmsg(r0, &(0x7f0000000580)={&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000500)}, 0x0) shutdown(r0, 0x0) 16:24:37 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r1, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:37 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:37 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:37 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:37 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:37 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:39 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000dc0)={"1300000900000000000200", @ifru_settings={0x0, 0x0, @cisco=&(0x7f0000000240)}}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xffffffffffffff33) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @local}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpid() socket(0x0, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000c40), 0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000500)) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000c00), 0x12) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) getpgrp(0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000bc0)='/selinux/mls\x00', 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/enforce\x00', 0x0, 0x0) 16:24:39 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:39 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r1, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:39 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:39 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:39 executing program 4: futex(&(0x7f0000000380), 0x7, 0x0, &(0x7f00000003c0)={0x77359400}, &(0x7f00000005c0), 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000500)) getgroups(0x0, &(0x7f0000000200)) setgroups(0x0, &(0x7f0000000240)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') openat$keychord(0xffffffffffffff9c, &(0x7f0000000280)='/dev/keychord\x00', 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000480), 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000580)='system.posix_acl_default\x00', &(0x7f0000000600), 0x24, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f00000002c0)=""/168) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.nlink\x00', &(0x7f0000000540)={'L+', 0x7fffffff}, 0x28, 0x0) 16:24:39 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:39 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:39 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:39 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:39 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:40 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153e0f34488dd25d766070") write$cgroup_type(r0, &(0x7f0000001340)='threaded\x00', 0xfffffd63) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) mmap(&(0x7f0000532000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 16:24:45 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:45 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r1, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:45 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:45 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:47 executing program 4: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) clone(0x4002102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) fremovexattr(r0, &(0x7f0000000080)=ANY=[]) 16:24:47 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@dev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in6=@ipv4={[], [], @dev}, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000001d40)=0xe8) geteuid() unlink(&(0x7f0000000180)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") open$dir(&(0x7f0000003100)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003140)) gettid() geteuid() lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003bc0)) fstat(0xffffffffffffff9c, &(0x7f0000003c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/mls\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/rtc0\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/ashmem\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003dc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000003e00)='cgroup.type\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003e40)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/checkreqprot\x00', 0x0, 0x0) 16:24:47 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:47 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r1, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:47 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:48 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:48 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:24:52 executing program 3: clone(0x81000101, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r0 = getpid() r1 = memfd_create(&(0x7f0000000240)="5450f3d3585900", 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000080)) listen(r1, 0x0) 16:24:52 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r1, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:52 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:52 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:52 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000100)={0x4, 0x200000022d}) readv(r0, &(0x7f0000000240)=[{&(0x7f00000013c0)=""/135}, {&(0x7f0000001480)=""/25}, {&(0x7f00000003c0)=""/4096, 0x8}], 0x20000000000002ca) 16:24:52 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:24:52 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r1, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:52 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:52 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:53 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:53 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:53 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:54 executing program 3: 16:24:54 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:54 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:24:54 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:54 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:54 executing program 4: 16:24:54 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:54 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:54 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:54 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:54 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:54 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:55 executing program 3: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:55 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:55 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:55 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:24:55 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:55 executing program 4: 16:24:55 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:55 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:55 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:55 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:55 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:55 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:57 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:57 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:57 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:57 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, r1, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r2, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:57 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:57 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) 16:24:58 executing program 0: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0xb9) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'veth0_to_bond\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000880)=@xdp, &(0x7f0000000900)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000006c0)=0x78) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005780)={{{@in6=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000058c0)={{{@in=@broadcast, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000059c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005e80)={&(0x7f00000003c0), 0xc, &(0x7f0000005e40)={&(0x7f0000005a00)={0x14}, 0x14}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:24:58 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:58 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:24:58 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x6, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:24:58 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r1, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:24:59 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x5, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee00]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:25:04 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/status\x00', 0x0, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$ION_IOC_ALLOC(r1, 0xc0184908, &(0x7f0000000040)) socket$key(0xf, 0x3, 0x2) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x2, @thr={&(0x7f0000000140), &(0x7f0000000240)="bd6eac79615f0e5b9485deacaedb6515f74bb5e466a5dffb"}}, &(0x7f00000000c0)) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_procfs$namespace(r2, &(0x7f00000014c0)='ns/user\x00') r4 = fcntl$getown(r0, 0x9) ptrace$getsig(0x4202, r4, 0x200, &(0x7f0000000040)) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000001280)=0x0) rt_tgsigqueueinfo(r5, r4, 0x10, &(0x7f0000001480)={0x1b, 0x5, 0x7, 0x5}) fcntl$getown(r1, 0x9) getpeername$packet(r0, &(0x7f0000001380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000013c0)=0x14) recvfrom$packet(r0, &(0x7f00000012c0)=""/159, 0x9f, 0x1, &(0x7f0000001400)={0x11, 0xc, r6, 0x1, 0x4, 0x6, @random="95f5fa6f4fa7"}, 0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) write$selinux_validatetrans(r0, &(0x7f0000001500)={'system_u:object_r:memory_device_t:s0', 0x20, 'system_u:object_r:useradd_exec_t:s0', 0x20, 0x0, 0x20, '/usr/sbin/cups-browsed\x00'}, 0x75) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001440)='/dev/input/event#\x00', 0x1, 0x0) syz_execute_func(&(0x7f00000015c0)="42805da0d10fef69dc0d01ee660f3a6086c71d00080008cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:25:04 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:25:04 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) 16:25:04 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x4, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:25:04 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, 0x0, 0x0, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r1, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:04 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/status\x00', 0x0, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$ION_IOC_ALLOC(r1, 0xc0184908, &(0x7f0000000040)) socket$key(0xf, 0x3, 0x2) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x2, @thr={&(0x7f0000000140), &(0x7f0000000240)="bd6eac79615f0e5b9485deacaedb6515f74bb5e466a5dffb"}}, &(0x7f00000000c0)) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_procfs$namespace(r2, &(0x7f00000014c0)='ns/user\x00') r4 = fcntl$getown(r0, 0x9) ptrace$getsig(0x4202, r4, 0x200, &(0x7f0000000040)) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000001280)=0x0) rt_tgsigqueueinfo(r5, r4, 0x10, &(0x7f0000001480)={0x1b, 0x5, 0x7, 0x5}) fcntl$getown(r1, 0x9) getpeername$packet(r0, &(0x7f0000001380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000013c0)=0x14) recvfrom$packet(r0, &(0x7f00000012c0)=""/159, 0x9f, 0x1, &(0x7f0000001400)={0x11, 0xc, r6, 0x1, 0x4, 0x6, @random="95f5fa6f4fa7"}, 0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) write$selinux_validatetrans(r0, &(0x7f0000001500)={'system_u:object_r:memory_device_t:s0', 0x20, 'system_u:object_r:useradd_exec_t:s0', 0x20, 0x0, 0x20, '/usr/sbin/cups-browsed\x00'}, 0x75) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001440)='/dev/input/event#\x00', 0x1, 0x0) syz_execute_func(&(0x7f00000015c0)="42805da0d10fef69dc0d01ee660f3a6086c71d00080008cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") INIT: Id "6" respawning too fast: disabled for 5 minutes 16:25:05 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, 0x0, 0x0, 0x0, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r1, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:05 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x3, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff, 0x0]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes 16:25:05 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:25:05 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) 16:25:06 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x84, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r1, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:06 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x2, &(0x7f0000000540)=[0xee00, 0xffffffffffffffff]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:25:11 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/status\x00', 0x0, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$ION_IOC_ALLOC(r1, 0xc0184908, &(0x7f0000000040)) socket$key(0xf, 0x3, 0x2) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x2, @thr={&(0x7f0000000140), &(0x7f0000000240)="bd6eac79615f0e5b9485deacaedb6515f74bb5e466a5dffb"}}, &(0x7f00000000c0)) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_procfs$namespace(r2, &(0x7f00000014c0)='ns/user\x00') r4 = fcntl$getown(r0, 0x9) ptrace$getsig(0x4202, r4, 0x200, &(0x7f0000000040)) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000001280)=0x0) rt_tgsigqueueinfo(r5, r4, 0x10, &(0x7f0000001480)={0x1b, 0x5, 0x7, 0x5}) fcntl$getown(r1, 0x9) getpeername$packet(r0, &(0x7f0000001380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000013c0)=0x14) recvfrom$packet(r0, &(0x7f00000012c0)=""/159, 0x9f, 0x1, &(0x7f0000001400)={0x11, 0xc, r6, 0x1, 0x4, 0x6, @random="95f5fa6f4fa7"}, 0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) write$selinux_validatetrans(r0, &(0x7f0000001500)={'system_u:object_r:memory_device_t:s0', 0x20, 'system_u:object_r:useradd_exec_t:s0', 0x20, 0x0, 0x20, '/usr/sbin/cups-browsed\x00'}, 0x75) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001440)='/dev/input/event#\x00', 0x1, 0x0) syz_execute_func(&(0x7f00000015c0)="42805da0d10fef69dc0d01ee660f3a6086c71d00080008cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:25:11 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 16:25:11 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:11 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x68, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80}]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r1, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:11 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x1, &(0x7f0000000540)=[0xee00]) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:25:11 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) r2 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xfe90) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") fcntl$getown(r2, 0x9) getpgrp(0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000340)=0x0) getpgrp(r3) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e22, @broadcast}, {0x306, @remote}, 0x42, {0x2, 0x4e22, @multicast2}, 'teql0\x00'}) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x100000001) 16:25:11 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x60, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast2}}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r1, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:11 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 16:25:11 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000880)=0xffffffffffffffed) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgroups(0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getegid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 16:25:12 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:12 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x40, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x178d}]}, 0x40}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r1, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:12 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:18 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/status\x00', 0x0, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$ION_IOC_ALLOC(r1, 0xc0184908, &(0x7f0000000040)) socket$key(0xf, 0x3, 0x2) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x2, @thr={&(0x7f0000000140), &(0x7f0000000240)="bd6eac79615f0e5b9485deacaedb6515f74bb5e466a5dffb"}}, &(0x7f00000000c0)) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_procfs$namespace(r2, &(0x7f00000014c0)='ns/user\x00') r4 = fcntl$getown(r0, 0x9) ptrace$getsig(0x4202, r4, 0x200, &(0x7f0000000040)) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000001280)=0x0) rt_tgsigqueueinfo(r5, r4, 0x10, &(0x7f0000001480)={0x1b, 0x5, 0x7, 0x5}) fcntl$getown(r1, 0x9) getpeername$packet(r0, &(0x7f0000001380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000013c0)=0x14) recvfrom$packet(r0, &(0x7f00000012c0)=""/159, 0x9f, 0x1, &(0x7f0000001400)={0x11, 0xc, r6, 0x1, 0x4, 0x6, @random="95f5fa6f4fa7"}, 0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) write$selinux_validatetrans(r0, &(0x7f0000001500)={'system_u:object_r:memory_device_t:s0', 0x20, 'system_u:object_r:useradd_exec_t:s0', 0x20, 0x0, 0x20, '/usr/sbin/cups-browsed\x00'}, 0x75) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001440)='/dev/input/event#\x00', 0x1, 0x0) syz_execute_func(&(0x7f00000015c0)="42805da0d10fef69dc0d01ee660f3a6086c71d00080008cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:25:18 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 16:25:18 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:18 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x38, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2d2}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r1, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:18 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:18 executing program 4: chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e40)={{{@in=@multicast2, @in6=@remote}}, {{}, 0x0, @in=@local}}, &(0x7f0000000640)=0xe8) getgid() stat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) getgid() getresuid(&(0x7f0000002000), &(0x7f0000002040), &(0x7f0000002080)) stat(&(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)) getpid() lstat(&(0x7f00000026c0)='./file0/file0\x00', &(0x7f0000002700)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002780)={{{@in=@loopback, @in=@dev}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000002880)=0xe8) getresgid(&(0x7f00000028c0), &(0x7f0000002900), &(0x7f0000002940)) getuid() getgid() stat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) fstat(0xffffffffffffffff, &(0x7f0000002a40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002d80), 0x0, 0x0) prctl$setendian(0x14, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000340)) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000440)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) request_key(&(0x7f00000005c0)='rxrpc_s\x00', &(0x7f00000006c0), &(0x7f0000000700)='}bdev.selinux\x00', 0xfffffffffffffffa) request_key(&(0x7f00000000c0)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000740)='self\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:25:19 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x30, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r1, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:19 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) getpgrp(0xffffffffffffffff) 16:25:19 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:19 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:19 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) getpgrp(0xffffffffffffffff) 16:25:20 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) getpgrp(0xffffffffffffffff) 16:25:26 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000005c0)={0x0, @loopback, @loopback}, &(0x7f0000000600)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00', r1}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x80900, 0x0) utimensat(r0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)={{0x0, 0x2710}, {r2, r3/1000+10000}}, 0x0) accept4$inet(r0, &(0x7f00000004c0)={0x2, 0x0, @multicast1}, &(0x7f0000000500)=0x10, 0x80000) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:25:26 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:25:26 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r1, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:26 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:26 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) 16:25:27 executing program 4: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x6, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:27 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) 16:25:27 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:27 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:25:27 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x4000) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r1, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:27 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) 16:25:27 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:32 executing program 3: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f00000000c0)='loginuid\x00') writev(r1, &(0x7f0000000000)=[{&(0x7f0000000100)='0', 0x1}], 0x1) 16:25:32 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:25:32 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r1, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:32 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:32 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:34 executing program 4: syz_emit_ethernet(0x1, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000001780)) 16:25:34 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)={0x1, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r0, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:34 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:25:34 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:34 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:35 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)={0x0, 0x9, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf', @remote]}) fcntl$setflags(r0, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:35 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000040)=0x9, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x4000000000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x0, 0x7a}, 0x14) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) write$binfmt_elf32(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300000000000000000000003800000000000000000000000000260000000000000000000000000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005a271c5600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000002f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000"], 0x1fc) sendto$inet6(r0, &(0x7f00000005c0), 0xfffffdef, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) connect(r0, &(0x7f0000000280)=@un=@abs, 0x80) 16:25:35 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:25:35 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:36 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)={0x0, 0x8, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @random='Q>\aV\bf']}) fcntl$setflags(r0, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:36 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:25:37 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@broute={"62726f75746500000000000000000000000000000000000000c000", 0x20, 0x1, 0x168, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x300, &(0x7f0000000040), &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_0\x00', 'vlan0\x00', 'eql\x00', 'ifb0\x00', @empty, [], @remote, [], 0xa0, 0xa0, 0xd8, [@cpu={'cpu\x00', 0x8}]}}, @common=@mark={'mark\x00', 0x10, {{0x0, 0xffffffffffffffff}}}}]}]}, 0x1e0) 16:25:37 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:37 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:37 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)={0x0, 0x7, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}]}) fcntl$setflags(r0, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:37 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:25:38 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:38 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)={0x0, 0x6, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}]}) fcntl$setflags(r0, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:39 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000000)) 16:25:39 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:25:39 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)={0x0, 0x6, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}]}) fcntl$setflags(r0, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:39 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:39 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:40 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)) 16:25:40 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)={0x0, 0x5, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23"]}) fcntl$setflags(r0, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:40 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:25:40 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:40 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:41 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)={0x0, 0x5, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23"]}) fcntl$setflags(r0, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:41 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:42 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000020000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100000000000000ffffff7f0000000011cc2c74448a48a8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) 16:25:42 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:25:42 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)={0x0, 0x5, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="378a511a5b23"]}) fcntl$setflags(r0, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:42 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:43 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:44 executing program 4: fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000440)) openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffff9c, &(0x7f0000000080)='threaded\x00', 0x9) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) request_key(&(0x7f0000000280)='encrypted\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffff8) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0) memfd_create(&(0x7f00000001c0)='\x00', 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000480)) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000400)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='user\x00'}, 0x10) 16:25:44 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)={0x0, 0x4, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}]}) fcntl$setflags(r0, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:44 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:44 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:25:44 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:45 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:25:45 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)={0x0, 0x3, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast]}) fcntl$setflags(r0, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:46 executing program 3: futex(&(0x7f0000000380), 0x9, 0x0, &(0x7f00000003c0)={0x77359400}, &(0x7f0000000480), 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000ac0)}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@remote, @in=@remote}}, {{@in=@remote}}}, &(0x7f0000000c40)=0xe8) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000500)) getgroups(0x0, &(0x7f0000000200)) setgroups(0x0, &(0x7f0000000240)) clock_getres(0x0, &(0x7f0000000640)) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000080)) openat$full(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/full\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000d00)) timer_create(0x0, &(0x7f0000000880)={0x0, 0x0, 0x0, @thr={&(0x7f0000000680), &(0x7f0000000780)}}, &(0x7f00000008c0)) timer_gettime(0x0, &(0x7f0000000900)) futex(&(0x7f0000000040), 0x0, 0x200000000006, &(0x7f0000000240), &(0x7f0000000200), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$keychord(0xffffffffffffff9c, &(0x7f0000000280)='/dev/keychord\x00', 0x0, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f00000002c0)=""/168) getitimer(0x0, &(0x7f0000000940)) mmap$binder(&(0x7f0000ff1000/0xd000)=nil, 0xd000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000980)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000600)) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f0000000580)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f00000000c0)}}, {0x0, 0x0, 0x0, {}, {}, @ramp}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) 16:25:46 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:46 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:46 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:25:46 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)={0x0, 0x2, [@empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}]}) fcntl$setflags(r0, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:52 executing program 4: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0x3e8) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000400)) sched_getattr(0x0, &(0x7f00000005c0), 0x30, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") pipe(&(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000200)) epoll_create(0x0) 16:25:52 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:25:52 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)={0x0, 0x1, [@empty]}) fcntl$setflags(r0, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:52 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:52 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:52 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:25:52 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:25:54 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000280), &(0x7f00000002c0)=0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000001c0)={@mcast1}, &(0x7f0000000200)=0x20) inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$getflags(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000019c0), &(0x7f0000001a00)=0xc) getgroups(0x0, &(0x7f0000001a40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a80)={{{@in=@remote, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001b80)=0xe8) stat(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)) sched_setaffinity(0x0, 0x8, &(0x7f0000002f40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002000)={{{@in, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000002100)=0xe8) getgroups(0x0, &(0x7f0000002140)) getuid() getresgid(&(0x7f0000002180), &(0x7f00000021c0), &(0x7f0000002200)) stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) getgid() geteuid() getgroups(0x1, &(0x7f00000025c0)=[0xee01]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c40), &(0x7f0000002c80)=0xc) stat(&(0x7f0000002cc0)='./file0\x00', &(0x7f0000002d00)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002dc0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 16:25:54 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)) fcntl$setflags(r0, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:54 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:25:54 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:54 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:59 executing program 4: stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/185, 0x3e8) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000400)) sched_getattr(0x0, &(0x7f00000005c0), 0x30, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") pipe(&(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000200)) epoll_create(0x0) 16:25:59 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:25:59 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:25:59 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:25:59 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:00 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:26:00 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:26:01 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000280), &(0x7f00000002c0)=0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000001c0)={@mcast1}, &(0x7f0000000200)=0x20) inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$getflags(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000019c0), &(0x7f0000001a00)=0xc) getgroups(0x0, &(0x7f0000001a40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a80)={{{@in=@remote, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001b80)=0xe8) stat(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)) sched_setaffinity(0x0, 0x8, &(0x7f0000002f40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002000)={{{@in, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000002100)=0xe8) getgroups(0x0, &(0x7f0000002140)) getuid() getresgid(&(0x7f0000002180), &(0x7f00000021c0), &(0x7f0000002200)) stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) getgid() geteuid() getgroups(0x1, &(0x7f00000025c0)=[0xee01]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c40), &(0x7f0000002c80)=0xc) stat(&(0x7f0000002cc0)='./file0\x00', &(0x7f0000002d00)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002dc0), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 16:26:01 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:26:01 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:01 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:01 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:06 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x40000000000004) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000069c0)) sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) 16:26:06 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:26:06 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:06 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:06 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:06 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:26:06 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:26:09 executing program 3: unshare(0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f0000000140)='mime_type\x00', 0xffffffffffffffff) getpgid(0x0) open(&(0x7f0000000540)='\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000580)) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)) lgetxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)=@random={'btrfs.', 'rdma.current\x00'}, &(0x7f00000003c0)=""/8, 0x8) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") keyctl$setperm(0x5, 0x0, 0x0) 16:26:09 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:26:09 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:09 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:09 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:09 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000080)={0x6, 0x80000001, 0x20, 0x0, 0x3}) inotify_rm_watch(0xffffffffffffffff, 0x0) 16:26:09 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:26:09 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:26:09 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:10 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:26:10 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:10 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:16 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040), 0x2) 16:26:16 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:26:16 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:16 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:16 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:16 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x1}) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)) 16:26:16 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:26:16 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:26:17 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:17 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:17 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:26:17 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:18 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mincore(&(0x7f0000ffd000/0x3000)=nil, 0x3000, &(0x7f0000000140)=""/253) 16:26:18 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:18 executing program 1: futex(&(0x7f0000000080), 0x7, 0x0, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0), 0x0) io_setup(0x2, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'bridge0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="1b00b9a4000e0000000000310ea9d108a6000000"]}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$FUSE_LSEEK(r0, &(0x7f0000000140)={0x18, 0xffffffffffffffff, 0x7, {0x3}}, 0x18) fcntl$getownex(r0, 0x10, &(0x7f0000000340)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@ipv4={[], [], @dev}, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) getegid() ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000004c0)) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@dev, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000740)=0xe8) getgroups(0x4, &(0x7f0000000780)=[0xffffffffffffffff, 0xee00, 0x0, 0xffffffffffffffff]) 16:26:18 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:18 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:18 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x1}) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)) 16:26:19 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:19 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0), 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001680)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000001440)={'filter\x00', 0x4}, 0x68) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001300)={{{@in=@local, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:26:20 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:20 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:20 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:20 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:22 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000500)={'vcan0\x00', {0x2, 0x4e23, @rand_addr=0x3}}) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) r2 = accept4$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) setitimer(0x0, &(0x7f0000000580)={{0x0, 0x2710}, {r3, r4/1000+30000}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000240)) socket$inet_udp(0x2, 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ion\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) fchown(r0, r5, r6) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00', 0x0}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14, 0xf}, @in=@multicast1, 0x4e23, 0x0, 0x4e20, 0x3, 0x0, 0x80, 0x80, 0x29, r7, r5}, {0x0, 0x6, 0x6, 0xeb, 0x7fffffff, 0x0, 0x3, 0x7fff}, {0x7, 0x7, 0x18ca, 0x1}, 0x8, 0x6e6bb5, 0x3, 0x0, 0x3, 0x3}, {{@in6, 0x4d4, 0x6c}, 0x0, @in6=@loopback, 0x3507, 0x3, 0x0, 0x2, 0x1d7, 0xc5a9, 0x40}}, 0xe8) getpgrp(0xffffffffffffffff) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f00000005c0)={0x1, 0x6}) accept4$inet(r2, 0x0, &(0x7f0000000680), 0x800) 16:26:22 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:22 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:22 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:22 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:24 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:24 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000500)={'vcan0\x00', {0x2, 0x4e23, @rand_addr=0x3}}) openat$keychord(0xffffffffffffff9c, &(0x7f0000000600)='/dev/keychord\x00', 0x0, 0x0) r2 = accept4$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) setitimer(0x0, &(0x7f0000000580)={{0x0, 0x2710}, {r3, r4/1000+30000}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000240)) socket$inet_udp(0x2, 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ion\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) fchown(r0, r5, r6) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00', 0x0}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev={0xac, 0x14, 0x14, 0xf}, @in=@multicast1, 0x4e23, 0x0, 0x4e20, 0x3, 0x0, 0x80, 0x80, 0x29, r7, r5}, {0x0, 0x6, 0x6, 0xeb, 0x7fffffff, 0x0, 0x3, 0x7fff}, {0x7, 0x7, 0x18ca, 0x1}, 0x8, 0x6e6bb5, 0x3, 0x0, 0x3, 0x3}, {{@in6, 0x4d4, 0x6c}, 0x0, @in6=@loopback, 0x3507, 0x3, 0x0, 0x2, 0x1d7, 0xc5a9, 0x40}}, 0xe8) getpgrp(0xffffffffffffffff) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f00000005c0)={0x1, 0x6}) accept4$inet(r2, 0x0, &(0x7f0000000680), 0x800) 16:26:24 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:24 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:24 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:25 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x80000) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:25 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:29 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000002540)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18, 0xffffffffffffffda, 0x7, {0x9}}, 0x18) bind(0xffffffffffffffff, &(0x7f0000000140)=@ethernet={0x307, @random="b9c68d0bac1f"}, 0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200)={0x0}, &(0x7f0000001240)=0xc) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f00000025c0)={@loopback, @remote, 0x0}, &(0x7f0000002600)=0xc) sendmsg$nl_route(r0, &(0x7f00000026c0)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x182}, 0xc, &(0x7f0000002680)={&(0x7f0000002640)=ANY=[@ANYBLOB="1c0100000000000000bd7000fedbdf2500000000", @ANYRES32=r2, @ANYBLOB="01000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4011}, 0x4000) prctl$setptracer(0x59616d61, 0x0) write$P9_RAUTH(r0, &(0x7f0000001300)={0x14, 0x67, 0x1, {0x40, 0x2, 0x2}}, 0x14) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) get_thread_area(&(0x7f00000000c0)={0x0, 0x20000800, 0xffffffffffffffff, 0x0, 0x81, 0xffffffff, 0x1, 0x3, 0x2, 0x6}) write$UHID_CREATE(r0, &(0x7f00000023c0)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f00000013c0)=""/4096, 0x1000, 0x10001, 0x80, 0x6, 0x9, 0xfff}, 0x120) syz_execute_func(&(0x7f0000001380)="42805da0d10fef69dcf30f2d163a608600088041cb913591913d062900290278996b2179660f38302f3ae5e575450f2e1adc94966b892801e0e2989f7f") fcntl$setown(r0, 0x8, r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000012c0)) 16:26:29 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) prctl$setptracer(0x59616d61, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="420055a0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a38286746d9f2e2988f0978db490fbd") 16:26:29 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:29 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:29 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:29 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000240)=0x3, 0x4) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) r3 = request_key(&(0x7f0000000340)='asymmetric\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000400)='\x00', 0xfffffffffffffffb) keyctl$get_persistent(0x16, r2, r3) write$P9_RCREATE(r1, &(0x7f0000000440)={0x18, 0x73, 0x2, {{0x90, 0x3, 0x3}, 0x2}}, 0x18) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:30 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:30 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:30 executing program 1: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) prctl$setptracer(0x59616d61, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000012c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000001300)="7171d7eec9c89135a179ff117be59ca9cd70858eeb51891bcab3216cb8658d63a4c6f80fb55ed8d9ecd2db59e0d9d4b8cb279da1e28f04f1b5f1f0118f1a0ad65633f27c1bbba98ae84f8bcf64b89223d9b2ee388019f3e01b511cf0bcd8785690e76d16a64da46102929dcf3fdfe2398ebdbea5a15aec7058077367995a572be7e9d8cbbca0f46812c9ec96b5fbacbdac83fd14082beb10555f453b8ff7c92a3b474530a52b5b58e392f231f63cbb888f6165ce", 0xb4, 0xfffffffffffffff9) r1 = request_key(&(0x7f00000013c0)='rxrpc\x00', &(0x7f0000001400)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000001440)='/dev/input/event#\x00', 0x0) keyctl$reject(0x13, r0, 0x8001, 0x100, r1) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:26:31 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:31 executing program 1: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) prctl$setptracer(0x59616d61, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000012c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000001300)="7171d7eec9c89135a179ff117be59ca9cd70858eeb51891bcab3216cb8658d63a4c6f80fb55ed8d9ecd2db59e0d9d4b8cb279da1e28f04f1b5f1f0118f1a0ad65633f27c1bbba98ae84f8bcf64b89223d9b2ee388019f3e01b511cf0bcd8785690e76d16a64da46102929dcf3fdfe2398ebdbea5a15aec7058077367995a572be7e9d8cbbca0f46812c9ec96b5fbacbdac83fd14082beb10555f453b8ff7c92a3b474530a52b5b58e392f231f63cbb888f6165ce", 0xb4, 0xfffffffffffffff9) r1 = request_key(&(0x7f00000013c0)='rxrpc\x00', &(0x7f0000001400)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000001440)='/dev/input/event#\x00', 0x0) keyctl$reject(0x13, r0, 0x8001, 0x100, r1) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:26:31 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:38 executing program 3: r0 = socket$inet(0x2, 0x3, 0x8) getsockopt$inet_mreqsrc(r0, 0x0, 0x50, &(0x7f0000000180)={@dev, @local, @broadcast}, &(0x7f00000001c0)=0xc) 16:26:38 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:38 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:38 executing program 1: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) prctl$setptracer(0x59616d61, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000012c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000001300)="7171d7eec9c89135a179ff117be59ca9cd70858eeb51891bcab3216cb8658d63a4c6f80fb55ed8d9ecd2db59e0d9d4b8cb279da1e28f04f1b5f1f0118f1a0ad65633f27c1bbba98ae84f8bcf64b89223d9b2ee388019f3e01b511cf0bcd8785690e76d16a64da46102929dcf3fdfe2398ebdbea5a15aec7058077367995a572be7e9d8cbbca0f46812c9ec96b5fbacbdac83fd14082beb10555f453b8ff7c92a3b474530a52b5b58e392f231f63cbb888f6165ce", 0xb4, 0xfffffffffffffff9) r1 = request_key(&(0x7f00000013c0)='rxrpc\x00', &(0x7f0000001400)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000001440)='/dev/input/event#\x00', 0x0) keyctl$reject(0x13, r0, 0x8001, 0x100, r1) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:26:38 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:38 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[]}}, 0x0) 16:26:38 executing program 1: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) prctl$setptracer(0x59616d61, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000012c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000001300)="7171d7eec9c89135a179ff117be59ca9cd70858eeb51891bcab3216cb8658d63a4c6f80fb55ed8d9ecd2db59e0d9d4b8cb279da1e28f04f1b5f1f0118f1a0ad65633f27c1bbba98ae84f8bcf64b89223d9b2ee388019f3e01b511cf0bcd8785690e76d16a64da46102929dcf3fdfe2398ebdbea5a15aec7058077367995a572be7e9d8cbbca0f46812c9ec96b5fbacbdac83fd14082beb10555f453b8ff7c92a3b474530a52b5b58e392f231f63cbb888f6165ce", 0xb4, 0xfffffffffffffff9) r1 = request_key(&(0x7f00000013c0)='rxrpc\x00', &(0x7f0000001400)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000001440)='/dev/input/event#\x00', 0x0) keyctl$reject(0x13, r0, 0x8001, 0x100, r1) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) 16:26:38 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:39 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:39 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:39 executing program 1: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) prctl$setptracer(0x59616d61, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000012c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000001300)="7171d7eec9c89135a179ff117be59ca9cd70858eeb51891bcab3216cb8658d63a4c6f80fb55ed8d9ecd2db59e0d9d4b8cb279da1e28f04f1b5f1f0118f1a0ad65633f27c1bbba98ae84f8bcf64b89223d9b2ee388019f3e01b511cf0bcd8785690e76d16a64da46102929dcf3fdfe2398ebdbea5a15aec7058077367995a572be7e9d8cbbca0f46812c9ec96b5fbacbdac83fd14082beb10555f453b8ff7c92a3b474530a52b5b58e392f231f63cbb888f6165ce", 0xb4, 0xfffffffffffffff9) r1 = request_key(&(0x7f00000013c0)='rxrpc\x00', &(0x7f0000001400)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000001440)='/dev/input/event#\x00', 0x0) keyctl$reject(0x13, r0, 0x8001, 0x100, r1) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) 16:26:39 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:40 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x11}]}}}]}, 0x3c}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d0252926285717070") 16:26:40 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:40 executing program 1: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) prctl$setptracer(0x59616d61, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000012c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000001300)="7171d7eec9c89135a179ff117be59ca9cd70858eeb51891bcab3216cb8658d63a4c6f80fb55ed8d9ecd2db59e0d9d4b8cb279da1e28f04f1b5f1f0118f1a0ad65633f27c1bbba98ae84f8bcf64b89223d9b2ee388019f3e01b511cf0bcd8785690e76d16a64da46102929dcf3fdfe2398ebdbea5a15aec7058077367995a572be7e9d8cbbca0f46812c9ec96b5fbacbdac83fd14082beb10555f453b8ff7c92a3b474530a52b5b58e392f231f63cbb888f6165ce", 0xb4, 0xfffffffffffffff9) r1 = request_key(&(0x7f00000013c0)='rxrpc\x00', &(0x7f0000001400)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000001440)='/dev/input/event#\x00', 0x0) keyctl$reject(0x13, r0, 0x8001, 0x100, r1) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) 16:26:40 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:40 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:40 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d0252926285717070") r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f00000007c0)={&(0x7f0000000040), 0xc, &(0x7f0000000780)={&(0x7f0000000840)=@newlink={0x20, 0x10, 0x1}, 0x20}}, 0x0) 16:26:40 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:40 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:40 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:40 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:40 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:40 executing program 1: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) prctl$setptracer(0x59616d61, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000012c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000001300)="7171d7eec9c89135a179ff117be59ca9cd70858eeb51891bcab3216cb8658d63a4c6f80fb55ed8d9ecd2db59e0d9d4b8cb279da1e28f04f1b5f1f0118f1a0ad65633f27c1bbba98ae84f8bcf64b89223d9b2ee388019f3e01b511cf0bcd8785690e76d16a64da46102929dcf3fdfe2398ebdbea5a15aec7058077367995a572be7e9d8cbbca0f46812c9ec96b5fbacbdac83fd14082beb10555f453b8ff7c92a3b474530a52b5b58e392f231f63cbb888f6165ce", 0xb4, 0xfffffffffffffff9) r1 = request_key(&(0x7f00000013c0)='rxrpc\x00', &(0x7f0000001400)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000001440)='/dev/input/event#\x00', 0x0) keyctl$reject(0x13, r0, 0x8001, 0x100, r1) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:26:41 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(r1, &(0x7f0000001980)={&(0x7f0000000540)=@l2, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000780)=[{0x10}], 0x10, 0x40}, 0x0) 16:26:41 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:41 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:41 executing program 1: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) prctl$setptracer(0x59616d61, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000012c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000001300)="7171d7eec9c89135a179ff117be59ca9cd70858eeb51891bcab3216cb8658d63a4c6f80fb55ed8d9ecd2db59e0d9d4b8cb279da1e28f04f1b5f1f0118f1a0ad65633f27c1bbba98ae84f8bcf64b89223d9b2ee388019f3e01b511cf0bcd8785690e76d16a64da46102929dcf3fdfe2398ebdbea5a15aec7058077367995a572be7e9d8cbbca0f46812c9ec96b5fbacbdac83fd14082beb10555f453b8ff7c92a3b474530a52b5b58e392f231f63cbb888f6165ce", 0xb4, 0xfffffffffffffff9) r1 = request_key(&(0x7f00000013c0)='rxrpc\x00', &(0x7f0000001400)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000001440)='/dev/input/event#\x00', 0x0) keyctl$reject(0x13, r0, 0x8001, 0x100, r1) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:26:41 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:44 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8932, &(0x7f00000001c0)='bond0\x00') 16:26:44 executing program 1: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) prctl$setptracer(0x59616d61, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000012c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000001300)="7171d7eec9c89135a179ff117be59ca9cd70858eeb51891bcab3216cb8658d63a4c6f80fb55ed8d9ecd2db59e0d9d4b8cb279da1e28f04f1b5f1f0118f1a0ad65633f27c1bbba98ae84f8bcf64b89223d9b2ee388019f3e01b511cf0bcd8785690e76d16a64da46102929dcf3fdfe2398ebdbea5a15aec7058077367995a572be7e9d8cbbca0f46812c9ec96b5fbacbdac83fd14082beb10555f453b8ff7c92a3b474530a52b5b58e392f231f63cbb888f6165ce", 0xb4, 0xfffffffffffffff9) r1 = request_key(&(0x7f00000013c0)='rxrpc\x00', &(0x7f0000001400)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000001440)='/dev/input/event#\x00', 0x0) keyctl$reject(0x13, r0, 0x8001, 0x100, r1) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:26:44 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:44 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'team_slave_1\x00', @ifru_hwaddr=@dev}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/192, &(0x7f00000000c0)=0x1b5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002980)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000002a80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0_to_team\x00'}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000140)={'bridge0\x00', {0x2, 0x0, @multicast2}}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") getpgrp(0xffffffffffffffff) 16:26:44 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x200000000000004f}, 0x38a) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0x80ffff, 0x201a7fd7, 0xa, 0xa, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0xffe3, &(0x7f00001a7f05)=""/251}, 0x48) 16:26:44 executing program 0: 16:26:44 executing program 1: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) prctl$setptracer(0x59616d61, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000012c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000001300)="7171d7eec9c89135a179ff117be59ca9cd70858eeb51891bcab3216cb8658d63a4c6f80fb55ed8d9ecd2db59e0d9d4b8cb279da1e28f04f1b5f1f0118f1a0ad65633f27c1bbba98ae84f8bcf64b89223d9b2ee388019f3e01b511cf0bcd8785690e76d16a64da46102929dcf3fdfe2398ebdbea5a15aec7058077367995a572be7e9d8cbbca0f46812c9ec96b5fbacbdac83fd14082beb10555f453b8ff7c92a3b474530a52b5b58e392f231f63cbb888f6165ce", 0xb4, 0xfffffffffffffff9) request_key(&(0x7f00000013c0)='rxrpc\x00', &(0x7f0000001400)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000001440)='/dev/input/event#\x00', 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:26:45 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:45 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:45 executing program 0: 16:26:45 executing program 0: 16:26:45 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/sockcreate\x00') write$selinux_context(r0, &(0x7f00000000c0)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 16:26:45 executing program 0: 16:26:45 executing program 1: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) prctl$setptracer(0x59616d61, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000012c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000001300)="7171d7eec9c89135a179ff117be59ca9cd70858eeb51891bcab3216cb8658d63a4c6f80fb55ed8d9ecd2db59e0d9d4b8cb279da1e28f04f1b5f1f0118f1a0ad65633f27c1bbba98ae84f8bcf64b89223d9b2ee388019f3e01b511cf0bcd8785690e76d16a64da46102929dcf3fdfe2398ebdbea5a15aec7058077367995a572be7e9d8cbbca0f46812c9ec96b5fbacbdac83fd14082beb10555f453b8ff7c92a3b474530a52b5b58e392f231f63cbb888f6165ce", 0xb4, 0xfffffffffffffff9) request_key(&(0x7f00000013c0)='rxrpc\x00', &(0x7f0000001400)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000001440)='/dev/input/event#\x00', 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:26:45 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:26:46 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/sockcreate\x00') write$selinux_context(r0, &(0x7f00000000c0)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) [ 1014.101805] audit: type=1400 audit(1536596806.018:23): avc: denied { create } for pid=15739 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=udp_socket permissive=1 [ 1015.270659] audit: type=1400 audit(1536596807.188:24): avc: denied { prog_run } for pid=15743 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1015.920012] audit: type=1400 audit(1536596807.838:25): avc: denied { connect } for pid=15749 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=udp_socket permissive=1 [ 1016.080083] audit: type=1400 audit(1536596807.998:26): avc: denied { write } for pid=15749 comm="syz-executor4" lport=37554 faddr=fe80:: scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:semanage_trans_lock_t:s0 tclass=udp_socket permissive=1 16:27:11 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/sockcreate\x00') write$selinux_context(r0, &(0x7f00000000c0)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 16:27:11 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/sockcreate\x00') write$selinux_context(r0, &(0x7f00000000c0)='system_u:object_r:semanage_trans_lock_t:s0\x00', 0x2b) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 16:27:11 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) timer_create(0x0, 0xffffffffffffffff, &(0x7f00000001c0)) getsockname$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@ipv4_newaddr={0x18, 0x14, 0x0, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}}, 0x18}, 0x1, 0x0, 0x0, 0x4010}, 0x4000000) 16:27:11 executing program 1: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) prctl$setptracer(0x59616d61, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000012c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000001300)="7171d7eec9c89135a179ff117be59ca9cd70858eeb51891bcab3216cb8658d63a4c6f80fb55ed8d9ecd2db59e0d9d4b8cb279da1e28f04f1b5f1f0118f1a0ad65633f27c1bbba98ae84f8bcf64b89223d9b2ee388019f3e01b511cf0bcd8785690e76d16a64da46102929dcf3fdfe2398ebdbea5a15aec7058077367995a572be7e9d8cbbca0f46812c9ec96b5fbacbdac83fd14082beb10555f453b8ff7c92a3b474530a52b5b58e392f231f63cbb888f6165ce", 0xb4, 0xfffffffffffffff9) request_key(&(0x7f00000013c0)='rxrpc\x00', &(0x7f0000001400)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000001440)='/dev/input/event#\x00', 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:27:11 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:27:11 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() socket$inet(0x2, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:27:12 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) timer_create(0x0, 0xffffffffffffffff, &(0x7f00000001c0)) getsockname$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@ipv4_newaddr={0x18, 0x14, 0x0, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}}, 0x18}, 0x1, 0x0, 0x0, 0x4010}, 0x4000000) 16:27:12 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:27:12 executing program 1: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) prctl$setptracer(0x59616d61, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000012c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000001300)="7171d7eec9c89135a179ff117be59ca9cd70858eeb51891bcab3216cb8658d63a4c6f80fb55ed8d9ecd2db59e0d9d4b8cb279da1e28f04f1b5f1f0118f1a0ad65633f27c1bbba98ae84f8bcf64b89223d9b2ee388019f3e01b511cf0bcd8785690e76d16a64da46102929dcf3fdfe2398ebdbea5a15aec7058077367995a572be7e9d8cbbca0f46812c9ec96b5fbacbdac83fd14082beb10555f453b8ff7c92a3b474530a52b5b58e392f231f63cbb888f6165ce", 0xb4, 0xfffffffffffffff9) keyctl$reject(0x13, r0, 0x8001, 0x100, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:27:12 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:27:12 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) timer_create(0x0, 0xffffffffffffffff, &(0x7f00000001c0)) getsockname$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@ipv4_newaddr={0x18, 0x14, 0x0, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}}, 0x18}, 0x1, 0x0, 0x0, 0x4010}, 0x4000000) 16:27:13 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) timer_create(0x0, 0xffffffffffffffff, &(0x7f00000001c0)) getsockname$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@ipv4_newaddr={0x18, 0x14, 0x0, 0x0, 0x0, {0x2, 0x1, 0x0, 0x0, r1}}, 0x18}, 0x1, 0x0, 0x0, 0x4010}, 0x4000000) 16:28:06 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) setrlimit(0x400000000000007, &(0x7f0000000000)) pipe2(&(0x7f0000000140), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 16:28:06 executing program 1: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) prctl$setptracer(0x59616d61, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000012c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000001300)="7171d7eec9c89135a179ff117be59ca9cd70858eeb51891bcab3216cb8658d63a4c6f80fb55ed8d9ecd2db59e0d9d4b8cb279da1e28f04f1b5f1f0118f1a0ad65633f27c1bbba98ae84f8bcf64b89223d9b2ee388019f3e01b511cf0bcd8785690e76d16a64da46102929dcf3fdfe2398ebdbea5a15aec7058077367995a572be7e9d8cbbca0f46812c9ec96b5fbacbdac83fd14082beb10555f453b8ff7c92a3b474530a52b5b58e392f231f63cbb888f6165ce", 0xb4, 0xfffffffffffffff9) keyctl$reject(0x13, r0, 0x8001, 0x100, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:28:06 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:28:06 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:28:06 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) timer_create(0x0, 0xffffffffffffffff, &(0x7f00000001c0)) getsockname$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) 16:28:06 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='em1,cgroup\x00'}, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0xa3, &(0x7f0000000700)=""/163}, 0x48) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='GPL\x00'}, 0x10) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") socket$inet_udp(0x2, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fcntl$notify(0xffffffffffffffff, 0x402, 0x0) exit(0x0) getdents64(0xffffffffffffffff, &(0x7f0000000340)=""/57, 0x39) 16:28:06 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) timer_create(0x0, 0xffffffffffffffff, &(0x7f00000001c0)) 16:28:06 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getpid() timer_create(0x0, 0xffffffffffffffff, &(0x7f00000001c0)) 16:28:06 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) timer_create(0x0, 0xffffffffffffffff, &(0x7f00000001c0)) 16:28:06 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) timer_create(0x0, 0xffffffffffffffff, &(0x7f00000001c0)) 16:28:06 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) timer_create(0x0, 0xffffffffffffffff, &(0x7f00000001c0)) 16:28:06 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) timer_create(0x0, 0xffffffffffffffff, &(0x7f00000001c0)) 16:28:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[], 0x0) 16:28:07 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) timer_create(0x0, 0xffffffffffffffff, &(0x7f00000001c0)) 16:28:07 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:28:07 executing program 1: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) prctl$setptracer(0x59616d61, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000012c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000001300)="7171d7eec9c89135a179ff117be59ca9cd70858eeb51891bcab3216cb8658d63a4c6f80fb55ed8d9ecd2db59e0d9d4b8cb279da1e28f04f1b5f1f0118f1a0ad65633f27c1bbba98ae84f8bcf64b89223d9b2ee388019f3e01b511cf0bcd8785690e76d16a64da46102929dcf3fdfe2398ebdbea5a15aec7058077367995a572be7e9d8cbbca0f46812c9ec96b5fbacbdac83fd14082beb10555f453b8ff7c92a3b474530a52b5b58e392f231f63cbb888f6165ce", 0xb4, 0xfffffffffffffff9) keyctl$reject(0x13, r0, 0x8001, 0x100, 0x0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:28:07 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) geteuid() geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:28:09 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fstatfs(r1, &(0x7f00000000c0)=""/63) 16:28:09 executing program 1: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) prctl$setptracer(0x59616d61, 0x0) r0 = request_key(&(0x7f00000013c0)='rxrpc\x00', &(0x7f0000001400)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000001440)='/dev/input/event#\x00', 0x0) keyctl$reject(0x13, 0x0, 0x8001, 0x100, r0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:28:09 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:28:09 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:28:09 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) timer_create(0x0, 0xffffffffffffffff, &(0x7f00000001c0)) 16:28:09 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) timer_create(0x0, 0xffffffffffffffff, &(0x7f00000001c0)) 16:28:09 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:28:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000140), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000180), 0x20000053) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000100)={@remote}, 0x14) 16:28:11 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) timer_create(0x0, 0xffffffffffffffff, &(0x7f00000001c0)) 16:28:11 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:28:11 executing program 1: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) prctl$setptracer(0x59616d61, 0x0) r0 = request_key(&(0x7f00000013c0)='rxrpc\x00', &(0x7f0000001400)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000001440)='/dev/input/event#\x00', 0x0) keyctl$reject(0x13, 0x0, 0x8001, 0x100, r0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:28:11 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:28:12 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flock(r0, 0x6fde256bc3e89aa) 16:28:12 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000200)) timer_create(0x0, 0xffffffffffffffff, &(0x7f00000001c0)) 16:28:12 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:28:12 executing program 1: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=""/4096) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@nfc, 0xffffffffffffffdd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200), &(0x7f0000001240)=0xc) prctl$setptracer(0x59616d61, 0x0) r0 = request_key(&(0x7f00000013c0)='rxrpc\x00', &(0x7f0000001400)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000001440)='/dev/input/event#\x00', 0x0) keyctl$reject(0x13, 0x0, 0x8001, 0x100, r0) syz_open_dev$evdev(&(0x7f0000001280)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 16:28:12 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getresgid(&(0x7f0000000b80), &(0x7f0000000bc0), &(0x7f0000000c00)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 16:28:12 executing program 0: futex(&(0x7f0000000080), 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0), 0x0) io_setup(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'bridge0\x00', &(0x7f0000000240)=ANY=[]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000140)={0x18}, 0x18) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@ipv4={[], [], @dev}, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@dev, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000740)=0xe8) getgroups(0x0, &(0x7f0000000780)) 16:28:13 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d40)={&(0x7f0000000980)='/dev/full\x00'}, 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000d80)) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) lookup_dcookie(0x0, &(0x7f0000000040)=""/59, 0x3b) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) eventfd(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@broadcast, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000700)) geteuid() socket$inet(0x2, 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getgroups(0x0, &(0x7f0000000880)) lchown(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, 0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getgid() getgroups(0x0, &(0x7f0000000980)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") [ 1289.429861] INFO: task syz-executor3:15931 blocked for more than 140 seconds. [ 1289.437321] Not tainted 4.9.126+ #90 [ 1289.449757] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1289.457940] syz-executor3 D29448 15931 2092 0x00000004 [ 1289.482595] ffff88019f1217c0 ffff8801d6240b00 ffff8801cbb22680 ffff8801a038c740 [ 1289.500022] ffff8801db721018 ffff8801a1b177b0 ffffffff8277d952 0000000000000000 [ 1289.508054] ffff88019f1217c0 ffffffff810ec84a 00fffc0000000000 ffff8801db7218f0 [ 1289.524862] Call Trace: [ 1289.527430] [] ? __schedule+0x662/0x1b10 [ 1289.549751] [] ? __local_bh_enable_ip+0x6a/0xd0 [ 1289.556329] [] schedule+0x7f/0x1b0 [ 1289.569721] [] __lock_sock+0x13c/0x250 [ 1289.575457] [] ? sock_def_readable+0x400/0x400 [ 1289.589714] [] ? wake_up_bit+0x30/0x30 [ 1289.595236] [] lock_sock_nested+0xf6/0x120 [ 1289.601481] [] ? __might_fault+0x18e/0x1d0 [ 1289.607670] [] do_ipv6_setsockopt.isra.4+0x260/0x2e20 [ 1289.618672] [] ? ipv6_update_options+0x300/0x300 [ 1289.625257] [] ? trace_hardirqs_on+0x10/0x10 [ 1289.631472] [] ? trace_hardirqs_on+0x10/0x10 [ 1289.637514] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 1289.644446] [] ? __lock_acquire+0x654/0x4a10 [ 1289.650688] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 1289.657526] [] ? check_preemption_disabled+0x3b/0x170 [ 1289.664580] [] ? avc_has_perm+0x15a/0x3a0 [ 1289.670577] [] ? avc_has_perm+0x1cc/0x3a0 [ 1289.676372] [] ? avc_has_perm+0x9e/0x3a0 [ 1289.689713] [] ? avc_has_perm_noaudit+0x2f0/0x2f0 [ 1289.696211] [] ? check_preemption_disabled+0x3b/0x170 [ 1289.709714] [] ? check_preemption_disabled+0x3b/0x170 [ 1289.716597] [] ? sock_has_perm+0x1c1/0x3e0 [ 1289.739709] [] ? sock_has_perm+0x293/0x3e0 [ 1289.745581] [] ? sock_has_perm+0x9f/0x3e0 [ 1289.759717] [] ? selinux_msg_queue_alloc_security+0x2e0/0x2e0 [ 1289.767329] [] ipv6_setsockopt+0x97/0x130 [ 1289.789712] [] tcp_setsockopt+0x88/0xe0 [ 1289.795380] [] sock_common_setsockopt+0x9a/0xe0 [ 1289.801909] [] SyS_setsockopt+0x166/0x260 [ 1289.807692] [] ? __fget+0x23b/0x3d0 [ 1289.813262] [] ? SyS_recv+0x40/0x40 [ 1289.818527] [] ? security_file_ioctl+0x8f/0xc0 [ 1289.825051] [] ? do_syscall_64+0x48/0x480 [ 1289.831017] [] ? SyS_recv+0x40/0x40 [ 1289.836277] [] do_syscall_64+0x19f/0x480 [ 1289.842163] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 1289.849070] [ 1289.849070] Showing all locks held in the system: [ 1289.855664] 2 locks held by khungtaskd/24: [ 1289.859897] #0: (rcu_read_lock){......}, at: [] watchdog+0x11c/0xa20 [ 1289.868678] #1: (tasklist_lock){.+.+..}, at: [] debug_show_all_locks+0x79/0x218 [ 1289.878632] 2 locks held by getty/2019: [ 1289.882624] #0: (&tty->ldisc_sem){++++++}, at: [] ldsem_down_read+0x32/0x40 [ 1289.891996] #1: (&ldata->atomic_read_lock){+.+...}, at: [] n_tty_read+0x202/0x16e0 [ 1289.902020] [ 1289.903625] ============================================= [ 1289.903625] [ 1289.911735] NMI backtrace for cpu 0 [ 1289.915432] CPU: 0 PID: 24 Comm: khungtaskd Not tainted 4.9.126+ #90 [ 1289.921901] ffff8801d9907d08 ffffffff81af1049 0000000000000000 0000000000000000 [ 1289.929898] 0000000000000000 0000000000000001 ffffffff810967d0 ffff8801d9907d40 [ 1289.937960] ffffffff81afbda9 0000000000000000 0000000000000000 0000000000000003 [ 1289.946177] Call Trace: [ 1289.948745] [] dump_stack+0xc1/0x128 [ 1289.954123] [] ? irq_force_complete_move+0x330/0x330 [ 1289.960869] [] nmi_cpu_backtrace.cold.0+0x48/0x87 [ 1289.967575] [] ? irq_force_complete_move+0x330/0x330 [ 1289.974306] [] nmi_trigger_cpumask_backtrace+0x12c/0x151 [ 1289.981387] [] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1289.988378] [] watchdog+0x6ad/0xa20 [ 1289.993665] [] ? watchdog+0x11c/0xa20 [ 1289.999098] [] kthread+0x26d/0x300 [ 1290.004267] [] ? reset_hung_task_detector+0x20/0x20 [ 1290.011023] [] ? kthread_park+0xa0/0xa0 [ 1290.016634] [] ? __switch_to_asm+0x34/0x70 [ 1290.022515] [] ? kthread_park+0xa0/0xa0 [ 1290.028118] [] ? kthread_park+0xa0/0xa0 [ 1290.033789] [] ret_from_fork+0x5c/0x70 [ 1290.039467] Sending NMI from CPU 0 to CPUs 1: [ 1290.044128] NMI backtrace for cpu 1 [ 1290.047754] CPU: 1 PID: 6908 Comm: syz-executor2 Not tainted 4.9.126+ #90 [ 1290.054673] task: ffff88019fec2f80 task.stack: ffff8801d4db0000 [ 1290.060712] RIP: 0033:[<00000000004023c4>] c [<00000000004023c4>] 0x4023c4 [ 1290.067794] RSP: 002b:00007f5d8ec80690 EFLAGS: 00000282 [ 1290.073226] RAX: 00000000b708a9fe RBX: 000000000000000b RCX: 00000000004572a9 [ 1290.080481] RDX: 0000000000000000 RSI: 00007f5d8ec806c0 RDI: 000000000000000b [ 1290.087741] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 1290.094996] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1290.102250] R13: 00000000004d7288 R14: 00000000004ca390 R15: 0000000000000000 [ 1290.109502] FS: 00007f5d8ec81700(0000) GS:ffff8801db700000(0000) knlGS:0000000000000000 [ 1290.117714] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1290.123582] CR2: 00007f4db4ab1000 CR3: 00000001d5dc1000 CR4: 00000000001606b0 [ 1290.130837] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1290.138091] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1290.145794] Kernel panic - not syncing: hung_task: blocked tasks [ 1290.151956] CPU: 0 PID: 24 Comm: khungtaskd Not tainted 4.9.126+ #90 [ 1290.158439] ffff8801d9907cc8 ffffffff81af1049 ffffffff82878340 00000000ffffffff [ 1290.166779] 0000000000000000 0000000000000000 dffffc0000000000 ffff8801d9907d88 [ 1290.174856] ffffffff813df5e5 0000000041b58ab3 ffffffff82c286e3 ffffffff813df426 [ 1290.182910] Call Trace: [ 1290.185494] [] dump_stack+0xc1/0x128 [ 1290.191028] [] panic+0x1bf/0x39f [ 1290.196034] [] ? add_taint.cold.6+0x16/0x16 [ 1290.202002] [] ? ___preempt_schedule+0x16/0x18 [ 1290.208236] [] ? nmi_trigger_cpumask_backtrace+0x102/0x151 [ 1290.215508] [] watchdog+0x6be/0xa20 [ 1290.220788] [] ? watchdog+0x11c/0xa20 [ 1290.226244] [] kthread+0x26d/0x300 [ 1290.231435] [] ? reset_hung_task_detector+0x20/0x20 [ 1290.238099] [] ? kthread_park+0xa0/0xa0 [ 1290.243721] [] ? __switch_to_asm+0x34/0x70 [ 1290.249597] [] ? kthread_park+0xa0/0xa0 [ 1290.255214] [] ? kthread_park+0xa0/0xa0 [ 1290.260837] [] ret_from_fork+0x5c/0x70 [ 1290.266808] Dumping ftrace buffer: [ 1290.270432] (ftrace buffer empty) [ 1290.274123] Kernel Offset: disabled [ 1290.277738] Rebooting in 86400 seconds..