[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 33.465267] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 36.485263] random: sshd: uninitialized urandom read (32 bytes read) [ 36.774006] random: sshd: uninitialized urandom read (32 bytes read) [ 37.951057] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.12' (ECDSA) to the list of known hosts. [ 43.666509] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/13 09:13:23 fuzzer started [ 44.940677] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/13 09:13:26 dialing manager at 10.128.0.26:38147 2018/09/13 09:13:26 syscalls: 1 2018/09/13 09:13:26 code coverage: enabled 2018/09/13 09:13:26 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/09/13 09:13:26 setuid sandbox: enabled 2018/09/13 09:13:26 namespace sandbox: enabled 2018/09/13 09:13:26 fault injection: enabled 2018/09/13 09:13:26 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/09/13 09:13:26 net packed injection: enabled 2018/09/13 09:13:26 net device setup: enabled [ 48.956810] random: crng init done 09:14:20 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0a5c2d023c126285718070") r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f4, &(0x7f0000000080)={'sit0\x00', @ifru_ivalue=0x20b17d7b}) 09:14:20 executing program 1: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) timerfd_create(0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000140)={'team_slave_0\x00', {0x2, 0x0, @multicast1}}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/64, 0x40) clock_getres(0x0, &(0x7f0000000500)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000380)={'U+', 0x3}, 0x28, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000240), &(0x7f0000000280)=0x14) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f00000003c0), 0x0) getpgid(0x0) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:14:20 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000200), 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000002c0)={&(0x7f0000000000), 0x346, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYRES32], 0xffffffc4}}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 09:14:20 executing program 5: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) timerfd_create(0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000140)={'team_slave_0\x00', {0x2, 0x0, @multicast1}}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/64, 0x40) clock_getres(0x0, &(0x7f0000000500)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000380)={'U+', 0x3}, 0x28, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000240), &(0x7f0000000280)=0x14) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f00000003c0), 0x0) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 09:14:20 executing program 3: creat(&(0x7f00000003c0)='./file0\x00', 0x0) clock_getres(0x0, &(0x7f0000000180)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() sigaltstack(&(0x7f0000ff6000/0x2000)=nil, &(0x7f0000000300)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xfffffffffffffffb) keyctl$assume_authority(0x10, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) delete_module(&(0x7f00000001c0)='/dev/full\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000088c0)={{{@in=@remote, @in6}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000089c0)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000008a00)=@xdp, &(0x7f0000008a80)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008ac0)={0x0, @broadcast, @remote}, &(0x7f0000008b00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008b40)={'bpq0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008b80)={0x0, @remote, @multicast2}, &(0x7f0000008bc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b600)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b640)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f000000b740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b940)={{{@in=@dev, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f000000ba40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000ba80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000bac0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000bb00)={@remote}, &(0x7f000000bb40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bb80)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f000000bc80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bd80)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f000000be80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000bec0)={@broadcast, @multicast2}, &(0x7f000000bf00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000c000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000c040)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000c080)={{{@in=@local, @in=@remote}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000c180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000c280)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f000000c380)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f000000c3c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000c400)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f000000ca80)={&(0x7f0000000280), 0xc, &(0x7f000000ca40)={&(0x7f000000c440)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) sendto$unix(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000500)=@file={0x0, './file1\x00'}, 0x6e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000440), 0x1000000000000240, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000007c0)=0xe8) syz_execute_func(&(0x7f0000000340)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe09500000000c4027dbc8140af0000ee31a3b786e29885c4227992dd289f9f") 09:14:20 executing program 4: clock_gettime(0x0, &(0x7f0000000200)) select(0x22a, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0x0, 0x10000000}, &(0x7f0000000140)) getpid() inotify_init() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000004180), 0x0, 0x0, &(0x7f0000004200)={0x2, 0x0, @local}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000700)={0x0, &(0x7f0000000580)}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@loopback, @dev}, &(0x7f0000000400)=0xc) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000), 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3, 0x1c) socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000480)={'bpq0\x00', {0x2, 0x0, @dev}}) finit_module(0xffffffffffffffff, &(0x7f0000000140)='.\x00', 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @multicast1}, 0x10) accept4$inet(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, @loopback}, &(0x7f0000000600)=0x10, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x0, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'IDLETIMER\x00'}, &(0x7f0000000440)=0x1e) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[]}}, 0x0) timer_delete(0x0) shutdown(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000300)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") [ 101.806149] IPVS: ftp: loaded support on port[0] = 21 [ 101.812831] IPVS: ftp: loaded support on port[0] = 21 [ 101.829723] IPVS: ftp: loaded support on port[0] = 21 [ 101.830994] IPVS: ftp: loaded support on port[0] = 21 [ 101.835563] IPVS: ftp: loaded support on port[0] = 21 [ 101.883761] IPVS: ftp: loaded support on port[0] = 21 [ 104.332187] ip (4473) used greatest stack depth: 53752 bytes left [ 105.217903] ip (4524) used greatest stack depth: 53496 bytes left [ 105.432353] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.438969] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.476852] device bridge_slave_0 entered promiscuous mode [ 105.502761] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.509309] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.534133] device bridge_slave_0 entered promiscuous mode [ 105.563433] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.569942] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.590948] device bridge_slave_0 entered promiscuous mode [ 105.621231] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.627703] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.674810] device bridge_slave_1 entered promiscuous mode [ 105.697498] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.703988] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.745175] device bridge_slave_0 entered promiscuous mode [ 105.795566] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.802195] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.817766] device bridge_slave_1 entered promiscuous mode [ 105.842699] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.849193] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.858728] device bridge_slave_0 entered promiscuous mode [ 105.874587] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.881145] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.907258] device bridge_slave_1 entered promiscuous mode [ 105.923065] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 105.932060] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.938565] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.961004] device bridge_slave_0 entered promiscuous mode [ 105.982134] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.988743] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.000807] device bridge_slave_1 entered promiscuous mode [ 106.010067] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 106.083450] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.089997] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.129063] device bridge_slave_1 entered promiscuous mode [ 106.160799] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 106.175604] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 106.184141] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 106.214158] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.220754] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.256580] device bridge_slave_1 entered promiscuous mode [ 106.278962] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 106.377602] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 106.410193] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 106.459396] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 106.508026] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 106.575247] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 106.693735] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 106.821776] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 106.903037] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 107.074757] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 107.107207] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 107.156128] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 107.175143] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 107.238796] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 107.360206] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 107.373493] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 107.418969] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 107.430799] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 107.437738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 107.456147] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 107.468609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 107.497916] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 107.594749] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 107.602949] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 107.609873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 107.686121] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 107.693050] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 107.709837] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 107.716778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 107.766850] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 107.773877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 107.807235] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 107.815912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 107.841945] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 107.848929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 107.959200] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 107.966216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 107.993789] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 108.000776] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 108.085551] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 108.092613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 108.258807] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 108.285090] team0: Port device team_slave_0 added [ 108.369098] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 108.386910] team0: Port device team_slave_0 added [ 108.497773] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 108.531006] team0: Port device team_slave_1 added [ 108.573092] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 108.586781] team0: Port device team_slave_0 added [ 108.634859] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 108.654947] team0: Port device team_slave_1 added [ 108.670708] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 108.691821] team0: Port device team_slave_0 added [ 108.721250] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 108.745313] team0: Port device team_slave_0 added [ 108.765604] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 108.775409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 108.785982] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 108.822197] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 108.836757] team0: Port device team_slave_1 added [ 108.858351] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 108.874749] team0: Port device team_slave_0 added [ 108.911201] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 108.923934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 108.936174] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 108.964521] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 108.981237] team0: Port device team_slave_1 added [ 108.992110] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 109.005399] team0: Port device team_slave_1 added [ 109.031395] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 109.041544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 109.057928] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 109.103323] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 109.115181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 109.131810] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 109.167269] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 109.181708] team0: Port device team_slave_1 added [ 109.187754] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 109.195170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 109.210928] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 109.243696] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 109.253075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 109.288052] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 109.313677] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 109.324544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 109.353167] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 109.379699] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 109.394094] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.420553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 109.441234] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 109.450057] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 109.456990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 109.474403] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 109.491488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 109.507985] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 109.522243] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 109.542839] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 109.550291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 109.560183] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 109.588847] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.619252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 109.646411] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 109.656561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 109.674943] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 109.691237] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 109.710171] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.727473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 109.749929] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 109.757346] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.773839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 109.798025] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 109.809939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.837972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 109.862858] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 109.873257] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 109.881361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 109.914494] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 109.922606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.939349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 109.970074] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 109.977873] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.991081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 110.023571] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 110.046889] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 110.055512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 110.069423] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 110.097495] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 110.126934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 110.152927] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 110.160398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 110.195043] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 110.228277] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 110.235768] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 110.267115] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 110.302332] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 110.318959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 110.346959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 112.295570] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.302071] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.308977] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.315455] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.352281] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 112.359323] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 112.438425] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.444919] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.451835] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.458291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.518495] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 112.638552] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.645047] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.651925] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.658384] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.718162] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 112.808028] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.814512] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.821362] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.827805] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.874572] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 112.884875] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.891316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.898159] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.904611] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.913519] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 112.934980] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.941438] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.948330] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.954788] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.967601] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 113.363848] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 113.379462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 113.399751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 113.415582] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 113.430301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 115.355249] ip (5045) used greatest stack depth: 53464 bytes left [ 121.677093] 8021q: adding VLAN 0 to HW filter on device bond0 [ 121.974233] 8021q: adding VLAN 0 to HW filter on device bond0 [ 122.020548] 8021q: adding VLAN 0 to HW filter on device bond0 [ 122.121198] 8021q: adding VLAN 0 to HW filter on device bond0 [ 122.269813] 8021q: adding VLAN 0 to HW filter on device bond0 [ 122.367826] 8021q: adding VLAN 0 to HW filter on device bond0 [ 122.604551] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 122.841501] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 122.888507] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 122.989569] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 123.074128] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 123.333303] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 123.476777] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 123.483062] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 123.497934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 123.602925] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 123.609222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 123.622757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 123.740263] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 123.746968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 123.755094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 123.881967] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 123.888265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 123.900811] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 123.996844] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 124.003117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 124.015729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 124.308936] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 124.315181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 124.327177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 124.492323] 8021q: adding VLAN 0 to HW filter on device team0 [ 124.535863] 8021q: adding VLAN 0 to HW filter on device team0 [ 124.612593] 8021q: adding VLAN 0 to HW filter on device team0 [ 124.781881] 8021q: adding VLAN 0 to HW filter on device team0 [ 124.902834] 8021q: adding VLAN 0 to HW filter on device team0 [ 125.244878] 8021q: adding VLAN 0 to HW filter on device team0 09:14:50 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000200), 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000002c0)={&(0x7f0000000000), 0x346, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYRES32], 0xffffffc4}}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 09:14:50 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000000000)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000680), 0x0, &(0x7f0000000340)}, 0x0) 09:14:50 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c3d023c126285718070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x20, 0x10, 0xc362e63b3f31ba5f}, 0x20}}, 0x0) 09:14:51 executing program 3: creat(&(0x7f00000003c0)='./file0\x00', 0x0) clock_getres(0x0, &(0x7f0000000180)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() sigaltstack(&(0x7f0000ff6000/0x2000)=nil, &(0x7f0000000300)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xfffffffffffffffb) keyctl$assume_authority(0x10, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) delete_module(&(0x7f00000001c0)='/dev/full\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000088c0)={{{@in=@remote, @in6}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000089c0)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000008a00)=@xdp, &(0x7f0000008a80)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008ac0)={0x0, @broadcast, @remote}, &(0x7f0000008b00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008b40)={'bpq0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008b80)={0x0, @remote, @multicast2}, &(0x7f0000008bc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b600)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b640)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f000000b740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b940)={{{@in=@dev, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f000000ba40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000ba80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000bac0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000bb00)={@remote}, &(0x7f000000bb40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bb80)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f000000bc80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bd80)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f000000be80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000bec0)={@broadcast, @multicast2}, &(0x7f000000bf00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000c000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000c040)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000c080)={{{@in=@local, @in=@remote}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000c180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000c280)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f000000c380)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f000000c3c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000c400)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f000000ca80)={&(0x7f0000000280), 0xc, &(0x7f000000ca40)={&(0x7f000000c440)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) sendto$unix(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000500)=@file={0x0, './file1\x00'}, 0x6e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000440), 0x1000000000000240, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000007c0)=0xe8) syz_execute_func(&(0x7f0000000340)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe09500000000c4027dbc8140af0000ee31a3b786e29885c4227992dd289f9f") 09:14:51 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={@multicast1, @broadcast}, &(0x7f0000000480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@local, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000600)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000680)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000b40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000d00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000e40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e80)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001380)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'syzkaller1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001440)={{{@in=@multicast2, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000001540)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001580)={0x0, @loopback}, &(0x7f00000015c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000027c0)={0x0, @dev, @broadcast}, &(0x7f0000002800)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002bc0)={0x0, @multicast2, @dev}, &(0x7f0000002c00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002c40)={@multicast2, @rand_addr}, &(0x7f0000002c80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d80)={{{@in6=@remote, @in=@dev}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000002e80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f40)={@empty, @local}, &(0x7f0000002f80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002fc0)={{{@in=@broadcast, @in6=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f00000030c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003280)={{{@in6=@ipv4={[], [], @multicast1}, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000003380)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000033c0)={@loopback}, &(0x7f0000003400)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289fb4b4") 09:14:51 executing program 0: statfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000b80), 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000080)={'IDLETIMER\x00'}, &(0x7f0000000180)=0x1e) clock_gettime(0x0, &(0x7f0000000280)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000006c0)=@filter={'filter\x00', 0xe, 0x4, 0x3a0, 0x360, 0x0, 0x0, 0x0, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x4, &(0x7f0000000240), {[{{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xc8, 0xf0}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0), 0x0, 0x0, &(0x7f00000040c0)) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000640)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 09:14:51 executing program 4: getpgid(0xffffffffffffffff) ptrace(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) pipe2$9p(&(0x7f00000000c0), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) getpid() mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000b6f000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 09:14:51 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000340), 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x11b, 0x4) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0x0) close(r0) 09:14:51 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000200), 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000002c0)={&(0x7f0000000000), 0x346, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYRES32], 0xffffffc4}}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 09:14:51 executing program 5: msync(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@broadcast, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000300)) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000240)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000380)={0xa0}, 0xa0) socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom(0xffffffffffffffff, &(0x7f0000000780)=""/187, 0xbb, 0x0, &(0x7f0000000700)=@sco, 0x32e) lremovexattr(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)=@known='system.posix_acl_access\x00') getegid() syz_execute_func(&(0x7f0000000080)="42805da0cd0fef69dcce73fe19a9380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fb660ffafa44dbe271fb26f00fbb9500000000") 09:14:52 executing program 3: creat(&(0x7f00000003c0)='./file0\x00', 0x0) clock_getres(0x0, &(0x7f0000000180)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() sigaltstack(&(0x7f0000ff6000/0x2000)=nil, &(0x7f0000000300)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xfffffffffffffffb) keyctl$assume_authority(0x10, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) delete_module(&(0x7f00000001c0)='/dev/full\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000088c0)={{{@in=@remote, @in6}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000089c0)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000008a00)=@xdp, &(0x7f0000008a80)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008ac0)={0x0, @broadcast, @remote}, &(0x7f0000008b00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008b40)={'bpq0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008b80)={0x0, @remote, @multicast2}, &(0x7f0000008bc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b600)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b640)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f000000b740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b940)={{{@in=@dev, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f000000ba40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000ba80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000bac0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000bb00)={@remote}, &(0x7f000000bb40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bb80)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f000000bc80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bd80)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f000000be80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000bec0)={@broadcast, @multicast2}, &(0x7f000000bf00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000c000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000c040)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000c080)={{{@in=@local, @in=@remote}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000c180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000c280)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f000000c380)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f000000c3c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000c400)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f000000ca80)={&(0x7f0000000280), 0xc, &(0x7f000000ca40)={&(0x7f000000c440)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) sendto$unix(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000500)=@file={0x0, './file1\x00'}, 0x6e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000440), 0x1000000000000240, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000007c0)=0xe8) syz_execute_func(&(0x7f0000000340)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe09500000000c4027dbc8140af0000ee31a3b786e29885c4227992dd289f9f") 09:14:52 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={@multicast1, @broadcast}, &(0x7f0000000480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@local, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000600)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000680)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000b40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000d00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000e40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e80)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001380)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'syzkaller1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001440)={{{@in=@multicast2, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000001540)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001580)={0x0, @loopback}, &(0x7f00000015c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000027c0)={0x0, @dev, @broadcast}, &(0x7f0000002800)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002bc0)={0x0, @multicast2, @dev}, &(0x7f0000002c00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002c40)={@multicast2, @rand_addr}, &(0x7f0000002c80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d80)={{{@in6=@remote, @in=@dev}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000002e80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f40)={@empty, @local}, &(0x7f0000002f80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002fc0)={{{@in=@broadcast, @in6=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f00000030c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003280)={{{@in6=@ipv4={[], [], @multicast1}, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000003380)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000033c0)={@loopback}, &(0x7f0000003400)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289fb4b4") 09:14:52 executing program 0: statfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000b80), 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000080)={'IDLETIMER\x00'}, &(0x7f0000000180)=0x1e) clock_gettime(0x0, &(0x7f0000000280)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000006c0)=@filter={'filter\x00', 0xe, 0x4, 0x3a0, 0x360, 0x0, 0x0, 0x0, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x4, &(0x7f0000000240), {[{{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xc8, 0xf0}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0), 0x0, 0x0, &(0x7f00000040c0)) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000640)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 09:14:52 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000200), 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000002c0)={&(0x7f0000000000), 0x346, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYRES32], 0xffffffc4}}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 09:14:52 executing program 4: getpgid(0xffffffffffffffff) ptrace(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) pipe2$9p(&(0x7f00000000c0), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) getpid() mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000b6f000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 09:14:53 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r0, 0x8912, &(0x7f0000000200)="153f6234488dd25d766070") r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$bt_hci(r1, 0x65, 0x5, &(0x7f0000cbc000)=""/244, &(0x7f00000000c0)=0xf4) 09:14:53 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r0, 0x8912, &(0x7f0000000200)="153f6234488dd25d766070") r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$bt_hci(r1, 0x65, 0x5, &(0x7f0000cbc000)=""/244, &(0x7f00000000c0)=0xf4) 09:14:53 executing program 3: creat(&(0x7f00000003c0)='./file0\x00', 0x0) clock_getres(0x0, &(0x7f0000000180)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() sigaltstack(&(0x7f0000ff6000/0x2000)=nil, &(0x7f0000000300)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xfffffffffffffffb) keyctl$assume_authority(0x10, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) delete_module(&(0x7f00000001c0)='/dev/full\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000088c0)={{{@in=@remote, @in6}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000089c0)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000008a00)=@xdp, &(0x7f0000008a80)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008ac0)={0x0, @broadcast, @remote}, &(0x7f0000008b00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008b40)={'bpq0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008b80)={0x0, @remote, @multicast2}, &(0x7f0000008bc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b600)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b640)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f000000b740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b940)={{{@in=@dev, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f000000ba40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000ba80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000bac0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000bb00)={@remote}, &(0x7f000000bb40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bb80)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f000000bc80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bd80)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f000000be80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000bec0)={@broadcast, @multicast2}, &(0x7f000000bf00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000c000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000c040)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000c080)={{{@in=@local, @in=@remote}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000c180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000c280)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f000000c380)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f000000c3c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000c400)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f000000ca80)={&(0x7f0000000280), 0xc, &(0x7f000000ca40)={&(0x7f000000c440)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) sendto$unix(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000500)=@file={0x0, './file1\x00'}, 0x6e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000440), 0x1000000000000240, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000007c0)=0xe8) syz_execute_func(&(0x7f0000000340)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe09500000000c4027dbc8140af0000ee31a3b786e29885c4227992dd289f9f") 09:14:53 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={@multicast1, @broadcast}, &(0x7f0000000480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@local, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000600)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000680)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000b40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000d00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000e40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e80)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001380)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'syzkaller1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001440)={{{@in=@multicast2, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000001540)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001580)={0x0, @loopback}, &(0x7f00000015c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000027c0)={0x0, @dev, @broadcast}, &(0x7f0000002800)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002bc0)={0x0, @multicast2, @dev}, &(0x7f0000002c00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002c40)={@multicast2, @rand_addr}, &(0x7f0000002c80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d80)={{{@in6=@remote, @in=@dev}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000002e80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f40)={@empty, @local}, &(0x7f0000002f80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002fc0)={{{@in=@broadcast, @in6=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f00000030c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003280)={{{@in6=@ipv4={[], [], @multicast1}, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000003380)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000033c0)={@loopback}, &(0x7f0000003400)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289fb4b4") 09:14:53 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000200), 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000002c0)={&(0x7f0000000000), 0x346, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYRES32], 0xffffffc4}}, 0x0) 09:14:53 executing program 0: recvmmsg(0xffffffffffffff9c, &(0x7f0000002a80), 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) pipe2(&(0x7f0000000080), 0x0) unshare(0x0) pipe2(&(0x7f0000000140), 0x0) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) geteuid() getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) getuid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000016c0)) getgroups(0x0, &(0x7f0000001700)) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 09:14:53 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r0, 0x8912, &(0x7f0000000200)="153f6234488dd25d766070") r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$bt_hci(r1, 0x65, 0x5, &(0x7f0000cbc000)=""/244, &(0x7f00000000c0)=0xf4) 09:14:53 executing program 4: getpgid(0xffffffffffffffff) ptrace(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) pipe2$9p(&(0x7f00000000c0), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) getpid() mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000b6f000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) 09:14:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x7fe, 0x1000000ff) sendto$inet6(r0, &(0x7f00000000c0)="6a725a5f62d02a6be55afd02d999", 0xe, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x4, @mcast2}, 0x1c) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") recvmsg(r0, &(0x7f0000000300)={&(0x7f00000001c0)=@hci, 0x80, &(0x7f0000000240)}, 0x2000) 09:14:54 executing program 3: creat(&(0x7f00000003c0)='./file0\x00', 0x0) clock_getres(0x0, &(0x7f0000000180)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() sigaltstack(&(0x7f0000ff6000/0x2000)=nil, &(0x7f0000000300)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xfffffffffffffffb) keyctl$assume_authority(0x10, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) delete_module(&(0x7f00000001c0)='/dev/full\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000088c0)={{{@in=@remote, @in6}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000089c0)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000008a00)=@xdp, &(0x7f0000008a80)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008ac0)={0x0, @broadcast, @remote}, &(0x7f0000008b00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008b40)={'bpq0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008b80)={0x0, @remote, @multicast2}, &(0x7f0000008bc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b600)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b640)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f000000b740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b940)={{{@in=@dev, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f000000ba40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000ba80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000bac0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000bb00)={@remote}, &(0x7f000000bb40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bb80)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f000000bc80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bd80)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f000000be80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000bec0)={@broadcast, @multicast2}, &(0x7f000000bf00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000c000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000c040)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000c080)={{{@in=@local, @in=@remote}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000c180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000c280)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f000000c380)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f000000c3c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000c400)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f000000ca80)={&(0x7f0000000280), 0xc, &(0x7f000000ca40)={&(0x7f000000c440)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) sendto$unix(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000500)=@file={0x0, './file1\x00'}, 0x6e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000440), 0x1000000000000240, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000007c0)=0xe8) 09:14:54 executing program 4: msync(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@broadcast, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000300)) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000240)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000380)={0xa0}, 0xa0) socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom(0xffffffffffffffff, &(0x7f0000000780)=""/187, 0xbb, 0x0, &(0x7f0000000700)=@sco, 0x32e) lremovexattr(&(0x7f00000004c0)='./file0\x00', &(0x7f00000002c0)=@known='system.posix_acl_access\x00') getegid() syz_execute_func(&(0x7f0000000080)="42805da0cd0fef69dcce73fe19a9380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fb660ffafa44dbe271fb26f00fbb9500000000") ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000440)={0x0, {}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @local}}) 09:14:54 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={@multicast1, @broadcast}, &(0x7f0000000480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@local, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000600)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000680)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000b40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000d00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000e40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e80)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001380)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'syzkaller1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001440)={{{@in=@multicast2, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000001540)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001580)={0x0, @loopback}, &(0x7f00000015c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000027c0)={0x0, @dev, @broadcast}, &(0x7f0000002800)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002bc0)={0x0, @multicast2, @dev}, &(0x7f0000002c00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002c40)={@multicast2, @rand_addr}, &(0x7f0000002c80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d80)={{{@in6=@remote, @in=@dev}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000002e80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f40)={@empty, @local}, &(0x7f0000002f80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002fc0)={{{@in=@broadcast, @in6=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f00000030c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003280)={{{@in6=@ipv4={[], [], @multicast1}, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000003380)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000033c0)={@loopback}, &(0x7f0000003400)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289fb4b4") 09:14:54 executing program 5: clone(0xfffffffffffffffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000001700), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) seccomp(0x0, 0x0, &(0x7f0000000100)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000780)) getgroups(0x0, &(0x7f00000025c0)) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000280)) fstat(0xffffffffffffffff, &(0x7f0000002740)) fstat(0xffffffffffffffff, &(0x7f0000002b40)) getgid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002bc0), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c00), &(0x7f0000002c40)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'team_slave_0\x00'}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 09:14:54 executing program 0: recvmmsg(0xffffffffffffff9c, &(0x7f0000002a80), 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) pipe2(&(0x7f0000000080), 0x0) unshare(0x0) pipe2(&(0x7f0000000140), 0x0) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) geteuid() getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) getuid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000016c0)) getgroups(0x0, &(0x7f0000001700)) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 09:14:54 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000), 0x346, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYRES32], 0xffffffc4}}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 09:14:54 executing program 3: creat(&(0x7f00000003c0)='./file0\x00', 0x0) clock_getres(0x0, &(0x7f0000000180)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() sigaltstack(&(0x7f0000ff6000/0x2000)=nil, &(0x7f0000000300)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xfffffffffffffffb) keyctl$assume_authority(0x10, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) delete_module(&(0x7f00000001c0)='/dev/full\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000088c0)={{{@in=@remote, @in6}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000089c0)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000008a00)=@xdp, &(0x7f0000008a80)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008ac0)={0x0, @broadcast, @remote}, &(0x7f0000008b00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008b40)={'bpq0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008b80)={0x0, @remote, @multicast2}, &(0x7f0000008bc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b600)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b640)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f000000b740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b940)={{{@in=@dev, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f000000ba40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000ba80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000bac0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000bb00)={@remote}, &(0x7f000000bb40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bb80)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f000000bc80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bd80)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f000000be80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000bec0)={@broadcast, @multicast2}, &(0x7f000000bf00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000c000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000c040)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000c080)={{{@in=@local, @in=@remote}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000c180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000c280)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f000000c380)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f000000c3c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000c400)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f000000ca80)={&(0x7f0000000280), 0xc, &(0x7f000000ca40)={&(0x7f000000c440)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) sendto$unix(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000500)=@file={0x0, './file1\x00'}, 0x6e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000440), 0x1000000000000240, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000007c0)=0xe8) 09:14:55 executing program 3: creat(&(0x7f00000003c0)='./file0\x00', 0x0) clock_getres(0x0, &(0x7f0000000180)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() sigaltstack(&(0x7f0000ff6000/0x2000)=nil, &(0x7f0000000300)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xfffffffffffffffb) keyctl$assume_authority(0x10, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) delete_module(&(0x7f00000001c0)='/dev/full\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000088c0)={{{@in=@remote, @in6}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000089c0)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000008a00)=@xdp, &(0x7f0000008a80)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008ac0)={0x0, @broadcast, @remote}, &(0x7f0000008b00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008b40)={'bpq0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008b80)={0x0, @remote, @multicast2}, &(0x7f0000008bc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b600)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b640)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f000000b740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b940)={{{@in=@dev, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f000000ba40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000ba80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000bac0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000bb00)={@remote}, &(0x7f000000bb40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bb80)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f000000bc80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bd80)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f000000be80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000bec0)={@broadcast, @multicast2}, &(0x7f000000bf00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000c000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000c040)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000c080)={{{@in=@local, @in=@remote}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000c180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000c280)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f000000c380)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f000000c3c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000c400)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f000000ca80)={&(0x7f0000000280), 0xc, &(0x7f000000ca40)={&(0x7f000000c440)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) sendto$unix(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000500)=@file={0x0, './file1\x00'}, 0x6e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000440), 0x1000000000000240, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000007c0)=0xe8) 09:14:55 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={@multicast1, @broadcast}, &(0x7f0000000480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@local, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000600)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000680)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000b40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000d00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000e40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e80)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001380)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'syzkaller1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001440)={{{@in=@multicast2, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000001540)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001580)={0x0, @loopback}, &(0x7f00000015c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000027c0)={0x0, @dev, @broadcast}, &(0x7f0000002800)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002bc0)={0x0, @multicast2, @dev}, &(0x7f0000002c00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002c40)={@multicast2, @rand_addr}, &(0x7f0000002c80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d80)={{{@in6=@remote, @in=@dev}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000002e80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f40)={@empty, @local}, &(0x7f0000002f80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002fc0)={{{@in=@broadcast, @in6=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f00000030c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003280)={{{@in6=@ipv4={[], [], @multicast1}, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000003380)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000033c0)={@loopback}, &(0x7f0000003400)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 09:14:55 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) r2 = accept4(r1, 0x0, &(0x7f0000000200), 0x0) sendmsg$nl_netfilter(r2, &(0x7f00000002c0)={&(0x7f0000000000), 0x346, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYRES32], 0xffffffc4}}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 09:14:55 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r0, 0x8912, &(0x7f0000000200)="153f6234488dd25d766070") r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$bt_hci(r1, 0x65, 0x6, &(0x7f0000cbc000)=""/244, &(0x7f00000000c0)=0xf4) 09:14:55 executing program 3: creat(&(0x7f00000003c0)='./file0\x00', 0x0) clock_getres(0x0, &(0x7f0000000180)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() sigaltstack(&(0x7f0000ff6000/0x2000)=nil, &(0x7f0000000300)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xfffffffffffffffb) keyctl$assume_authority(0x10, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) delete_module(&(0x7f00000001c0)='/dev/full\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000088c0)={{{@in=@remote, @in6}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000089c0)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000008a00)=@xdp, &(0x7f0000008a80)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008ac0)={0x0, @broadcast, @remote}, &(0x7f0000008b00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008b40)={'bpq0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008b80)={0x0, @remote, @multicast2}, &(0x7f0000008bc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b600)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b640)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f000000b740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b940)={{{@in=@dev, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f000000ba40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000ba80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000bac0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000bb00)={@remote}, &(0x7f000000bb40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bb80)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f000000bc80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bd80)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f000000be80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000bec0)={@broadcast, @multicast2}, &(0x7f000000bf00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000c000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000c040)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000c080)={{{@in=@local, @in=@remote}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000c180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000c280)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f000000c380)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f000000c3c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000c400)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f000000ca80)={&(0x7f0000000280), 0xc, &(0x7f000000ca40)={&(0x7f000000c440)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) sendto$unix(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000500)=@file={0x0, './file1\x00'}, 0x6e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000440), 0x1000000000000240, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) getegid() syz_execute_func(&(0x7f0000000340)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe09500000000c4027dbc8140af0000ee31a3b786e29885c4227992dd289f9f") 09:14:55 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={@multicast1, @broadcast}, &(0x7f0000000480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@local, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000600)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000680)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000b40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000d00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000e40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e80)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001380)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'syzkaller1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001440)={{{@in=@multicast2, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000001540)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001580)={0x0, @loopback}, &(0x7f00000015c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000027c0)={0x0, @dev, @broadcast}, &(0x7f0000002800)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002bc0)={0x0, @multicast2, @dev}, &(0x7f0000002c00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002c40)={@multicast2, @rand_addr}, &(0x7f0000002c80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d80)={{{@in6=@remote, @in=@dev}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000002e80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f40)={@empty, @local}, &(0x7f0000002f80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002fc0)={{{@in=@broadcast, @in6=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f00000030c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003280)={{{@in6=@ipv4={[], [], @multicast1}, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000003380)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000033c0)={@loopback}, &(0x7f0000003400)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 09:14:55 executing program 4: 09:14:55 executing program 0: 09:14:55 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={&(0x7f0000000000), 0x346, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYRES32], 0xffffffc4}}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 09:14:55 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r0, 0x8912, &(0x7f0000000200)="153f6234488dd25d766070") r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$bt_hci(r1, 0x65, 0x6, &(0x7f0000cbc000)=""/244, &(0x7f00000000c0)=0xf4) 09:14:55 executing program 0: 09:14:56 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={@multicast1, @broadcast}, &(0x7f0000000480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@local, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000600)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000680)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000b40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000d00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000e40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e80)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001380)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'syzkaller1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001440)={{{@in=@multicast2, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000001540)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001580)={0x0, @loopback}, &(0x7f00000015c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000027c0)={0x0, @dev, @broadcast}, &(0x7f0000002800)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002bc0)={0x0, @multicast2, @dev}, &(0x7f0000002c00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002c40)={@multicast2, @rand_addr}, &(0x7f0000002c80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d80)={{{@in6=@remote, @in=@dev}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000002e80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f40)={@empty, @local}, &(0x7f0000002f80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002fc0)={{{@in=@broadcast, @in6=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f00000030c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003280)={{{@in6=@ipv4={[], [], @multicast1}, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000003380)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000033c0)={@loopback}, &(0x7f0000003400)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 09:14:56 executing program 4: 09:14:56 executing program 2: socket$inet6(0xa, 0x803, 0x5) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000200), 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={&(0x7f0000000000), 0x346, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYRES32], 0xffffffc4}}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 09:14:56 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={@multicast1, @broadcast}, &(0x7f0000000480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@local, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000600)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000680)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000b40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000d00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000e40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e80)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001380)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'syzkaller1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001440)={{{@in=@multicast2, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000001540)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001580)={0x0, @loopback}, &(0x7f00000015c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000027c0)={0x0, @dev, @broadcast}, &(0x7f0000002800)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002bc0)={0x0, @multicast2, @dev}, &(0x7f0000002c00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002c40)={@multicast2, @rand_addr}, &(0x7f0000002c80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d80)={{{@in6=@remote, @in=@dev}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000002e80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f40)={@empty, @local}, &(0x7f0000002f80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002fc0)={{{@in=@broadcast, @in6=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f00000030c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003280)={{{@in6=@ipv4={[], [], @multicast1}, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000003380)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000033c0)={@loopback}, &(0x7f0000003400)=0x14) syz_execute_func(&(0x7f0000000140)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289fb4b4") 09:14:56 executing program 4: 09:14:56 executing program 3: creat(&(0x7f00000003c0)='./file0\x00', 0x0) clock_getres(0x0, &(0x7f0000000180)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() sigaltstack(&(0x7f0000ff6000/0x2000)=nil, &(0x7f0000000300)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xfffffffffffffffb) keyctl$assume_authority(0x10, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) delete_module(&(0x7f00000001c0)='/dev/full\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000088c0)={{{@in=@remote, @in6}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000089c0)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000008a00)=@xdp, &(0x7f0000008a80)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008ac0)={0x0, @broadcast, @remote}, &(0x7f0000008b00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008b40)={'bpq0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008b80)={0x0, @remote, @multicast2}, &(0x7f0000008bc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b600)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b640)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f000000b740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b940)={{{@in=@dev, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f000000ba40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000ba80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000bac0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000bb00)={@remote}, &(0x7f000000bb40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bb80)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f000000bc80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bd80)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f000000be80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000bec0)={@broadcast, @multicast2}, &(0x7f000000bf00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000c000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000c040)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000c080)={{{@in=@local, @in=@remote}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000c180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000c280)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f000000c380)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f000000c3c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000c400)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f000000ca80)={&(0x7f0000000280), 0xc, &(0x7f000000ca40)={&(0x7f000000c440)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) sendto$unix(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000500)=@file={0x0, './file1\x00'}, 0x6e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000440), 0x1000000000000240, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) getegid() syz_execute_func(&(0x7f0000000340)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe09500000000c4027dbc8140af0000ee31a3b786e29885c4227992dd289f9f") 09:14:56 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r0, 0x8912, &(0x7f0000000200)="153f6234488dd25d766070") r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$bt_hci(r1, 0x65, 0x6, &(0x7f0000cbc000)=""/244, &(0x7f00000000c0)=0xf4) 09:14:56 executing program 4: 09:14:56 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={@multicast1, @broadcast}, &(0x7f0000000480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@local, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000600)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000680)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000b40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000d00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000e40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e80)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001380)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'syzkaller1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001440)={{{@in=@multicast2, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000001540)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001580)={0x0, @loopback}, &(0x7f00000015c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000027c0)={0x0, @dev, @broadcast}, &(0x7f0000002800)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002bc0)={0x0, @multicast2, @dev}, &(0x7f0000002c00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002c40)={@multicast2, @rand_addr}, &(0x7f0000002c80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d80)={{{@in6=@remote, @in=@dev}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000002e80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f40)={@empty, @local}, &(0x7f0000002f80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002fc0)={{{@in=@broadcast, @in6=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f00000030c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003280)={{{@in6=@ipv4={[], [], @multicast1}, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000003380)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000033c0)={@loopback}, &(0x7f0000003400)=0x14) syz_execute_func(&(0x7f0000000140)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289fb4b4") 09:14:56 executing program 2: socket$inet6(0xa, 0x803, 0x5) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000200), 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={&(0x7f0000000000), 0x346, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYRES32], 0xffffffc4}}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 09:14:56 executing program 0: 09:14:56 executing program 0: 09:14:56 executing program 4: 09:14:56 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={@multicast1, @broadcast}, &(0x7f0000000480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@local, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000600)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000680)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000b40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000d00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000e40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e80)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001380)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'syzkaller1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001440)={{{@in=@multicast2, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000001540)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001580)={0x0, @loopback}, &(0x7f00000015c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000027c0)={0x0, @dev, @broadcast}, &(0x7f0000002800)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002bc0)={0x0, @multicast2, @dev}, &(0x7f0000002c00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002c40)={@multicast2, @rand_addr}, &(0x7f0000002c80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d80)={{{@in6=@remote, @in=@dev}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000002e80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f40)={@empty, @local}, &(0x7f0000002f80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002fc0)={{{@in=@broadcast, @in6=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f00000030c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003280)={{{@in6=@ipv4={[], [], @multicast1}, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000003380)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000033c0)={@loopback}, &(0x7f0000003400)=0x14) syz_execute_func(&(0x7f0000000140)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289fb4b4") 09:14:56 executing program 0: 09:14:56 executing program 4: 09:14:57 executing program 5: 09:14:57 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={@multicast1, @broadcast}, &(0x7f0000000480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@local, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000600)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000680)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000b40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000d00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000e40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e80)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001380)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'syzkaller1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001440)={{{@in=@multicast2, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000001540)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001580)={0x0, @loopback}, &(0x7f00000015c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000027c0)={0x0, @dev, @broadcast}, &(0x7f0000002800)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002bc0)={0x0, @multicast2, @dev}, &(0x7f0000002c00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002c40)={@multicast2, @rand_addr}, &(0x7f0000002c80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d80)={{{@in6=@remote, @in=@dev}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000002e80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f40)={@empty, @local}, &(0x7f0000002f80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002fc0)={{{@in=@broadcast, @in6=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f00000030c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003280)={{{@in6=@ipv4={[], [], @multicast1}, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000003380)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289fb4b4") 09:14:57 executing program 3: creat(&(0x7f00000003c0)='./file0\x00', 0x0) clock_getres(0x0, &(0x7f0000000180)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() sigaltstack(&(0x7f0000ff6000/0x2000)=nil, &(0x7f0000000300)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xfffffffffffffffb) keyctl$assume_authority(0x10, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) delete_module(&(0x7f00000001c0)='/dev/full\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000088c0)={{{@in=@remote, @in6}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000089c0)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000008a00)=@xdp, &(0x7f0000008a80)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008ac0)={0x0, @broadcast, @remote}, &(0x7f0000008b00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008b40)={'bpq0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008b80)={0x0, @remote, @multicast2}, &(0x7f0000008bc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b600)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b640)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f000000b740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b940)={{{@in=@dev, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f000000ba40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000ba80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000bac0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000bb00)={@remote}, &(0x7f000000bb40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bb80)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f000000bc80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bd80)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f000000be80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000bec0)={@broadcast, @multicast2}, &(0x7f000000bf00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000c000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000c040)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000c080)={{{@in=@local, @in=@remote}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000c180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000c280)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f000000c380)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f000000c3c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000c400)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f000000ca80)={&(0x7f0000000280), 0xc, &(0x7f000000ca40)={&(0x7f000000c440)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) sendto$unix(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000500)=@file={0x0, './file1\x00'}, 0x6e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000440), 0x1000000000000240, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) getegid() syz_execute_func(&(0x7f0000000340)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe09500000000c4027dbc8140af0000ee31a3b786e29885c4227992dd289f9f") 09:14:57 executing program 2: socket$inet6(0xa, 0x803, 0x5) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000200), 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={&(0x7f0000000000), 0x346, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYRES32], 0xffffffc4}}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 09:14:57 executing program 0: 09:14:57 executing program 5: 09:14:57 executing program 4: 09:14:57 executing program 0: 09:14:57 executing program 5: 09:14:57 executing program 4: 09:14:58 executing program 5: unshare(0x28020400) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x57, 0xc3, &(0x7f0000386000)=""/195}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) 09:14:58 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a0676ffffff81004e220000000058000b4824ca944f64009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 09:14:58 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) getpid() mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000b6f000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mlock(&(0x7f0000b71000/0x3000)=nil, 0x3000) socket$netlink(0x10, 0x3, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000780), 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000840)) syz_execute_func(&(0x7f00000003c0)="428055a03b6969ef69dc00d9c421e5f6ad9600000069203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") getresuid(&(0x7f0000000380), &(0x7f0000000440), &(0x7f0000000480)) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) syz_emit_ethernet(0x66, &(0x7f0000000640)={@broadcast, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @local}, @gre}}}}, &(0x7f0000000080)) syz_emit_ethernet(0x0, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='%*posix_acl_access\x00'}, 0x10) dup(0xffffffffffffffff) add_key(&(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffe) alarm(0x0) keyctl$setperm(0x5, 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000140), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 09:14:58 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={@multicast1, @broadcast}, &(0x7f0000000480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@local, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000600)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000680)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000b40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000d00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000e40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e80)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001380)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'syzkaller1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001440)={{{@in=@multicast2, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000001540)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001580)={0x0, @loopback}, &(0x7f00000015c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000027c0)={0x0, @dev, @broadcast}, &(0x7f0000002800)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002bc0)={0x0, @multicast2, @dev}, &(0x7f0000002c00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002c40)={@multicast2, @rand_addr}, &(0x7f0000002c80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d80)={{{@in6=@remote, @in=@dev}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000002e80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f40)={@empty, @local}, &(0x7f0000002f80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002fc0)={{{@in=@broadcast, @in6=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f00000030c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003280)={{{@in6=@ipv4={[], [], @multicast1}, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000003380)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289fb4b4") 09:14:58 executing program 3: creat(&(0x7f00000003c0)='./file0\x00', 0x0) clock_getres(0x0, &(0x7f0000000180)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() sigaltstack(&(0x7f0000ff6000/0x2000)=nil, &(0x7f0000000300)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xfffffffffffffffb) keyctl$assume_authority(0x10, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) delete_module(&(0x7f00000001c0)='/dev/full\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000088c0)={{{@in=@remote, @in6}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000089c0)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000008a00)=@xdp, &(0x7f0000008a80)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008ac0)={0x0, @broadcast, @remote}, &(0x7f0000008b00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008b40)={'bpq0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008b80)={0x0, @remote, @multicast2}, &(0x7f0000008bc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b600)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b640)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f000000b740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b940)={{{@in=@dev, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f000000ba40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000ba80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000bac0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000bb00)={@remote}, &(0x7f000000bb40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bb80)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f000000bc80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bd80)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f000000be80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000bec0)={@broadcast, @multicast2}, &(0x7f000000bf00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000c000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000c040)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000c080)={{{@in=@local, @in=@remote}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000c180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000c280)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f000000c380)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f000000c3c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000c400)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f000000ca80)={&(0x7f0000000280), 0xc, &(0x7f000000ca40)={&(0x7f000000c440)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) sendto$unix(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000500)=@file={0x0, './file1\x00'}, 0x6e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000440), 0x1000000000000240, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000007c0)=0xe8) syz_execute_func(&(0x7f0000000340)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe09500000000c4027dbc8140af0000ee31a3b786e29885c4227992dd289f9f") 09:14:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000200), 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={&(0x7f0000000000), 0x346, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYRES32], 0xffffffc4}}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 09:14:58 executing program 5: unshare(0x28020400) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x57, 0xc3, &(0x7f0000386000)=""/195}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) 09:14:58 executing program 4: unshare(0x28020400) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x57, 0xc3, &(0x7f0000386000)=""/195}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) 09:14:58 executing program 5: unshare(0x28020400) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x57, 0xc3, &(0x7f0000386000)=""/195}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) 09:14:58 executing program 4: unshare(0x28020400) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x57, 0xc3, &(0x7f0000386000)=""/195}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) 09:14:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000200), 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={&(0x7f0000000000), 0x346, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYRES32], 0xffffffc4}}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 09:14:59 executing program 5: unshare(0x28020400) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x57, 0xc3, &(0x7f0000386000)=""/195}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) 09:14:59 executing program 4: unshare(0x28020400) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x57, 0xc3, &(0x7f0000386000)=""/195}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) 09:14:59 executing program 5: unshare(0x28020400) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00'}, 0x10) 09:14:59 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="59fea8daf2a79d498f"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) 09:14:59 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={@multicast1, @broadcast}, &(0x7f0000000480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@local, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000600)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000680)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000b40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000d00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000e40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e80)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001380)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'syzkaller1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001440)={{{@in=@multicast2, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000001540)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001580)={0x0, @loopback}, &(0x7f00000015c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000027c0)={0x0, @dev, @broadcast}, &(0x7f0000002800)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002bc0)={0x0, @multicast2, @dev}, &(0x7f0000002c00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002c40)={@multicast2, @rand_addr}, &(0x7f0000002c80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d80)={{{@in6=@remote, @in=@dev}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000002e80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f40)={@empty, @local}, &(0x7f0000002f80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002fc0)={{{@in=@broadcast, @in6=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f00000030c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003280)={{{@in6=@ipv4={[], [], @multicast1}, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000003380)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289fb4b4") 09:14:59 executing program 3: creat(&(0x7f00000003c0)='./file0\x00', 0x0) clock_getres(0x0, &(0x7f0000000180)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() sigaltstack(&(0x7f0000ff6000/0x2000)=nil, &(0x7f0000000300)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xfffffffffffffffb) keyctl$assume_authority(0x10, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) delete_module(&(0x7f00000001c0)='/dev/full\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000088c0)={{{@in=@remote, @in6}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000089c0)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000008a00)=@xdp, &(0x7f0000008a80)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008ac0)={0x0, @broadcast, @remote}, &(0x7f0000008b00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008b40)={'bpq0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008b80)={0x0, @remote, @multicast2}, &(0x7f0000008bc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b600)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b640)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f000000b740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b940)={{{@in=@dev, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f000000ba40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000ba80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000bac0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000bb00)={@remote}, &(0x7f000000bb40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bb80)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f000000bc80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bd80)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f000000be80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000bec0)={@broadcast, @multicast2}, &(0x7f000000bf00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000c000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000c040)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000c080)={{{@in=@local, @in=@remote}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000c180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000c280)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f000000c380)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f000000c3c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000c400)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f000000ca80)={&(0x7f0000000280), 0xc, &(0x7f000000ca40)={&(0x7f000000c440)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) sendto$unix(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000500)=@file={0x0, './file1\x00'}, 0x6e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000440), 0x1000000000000240, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000007c0)=0xe8) syz_execute_func(&(0x7f0000000340)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe09500000000c4027dbc8140af0000ee31a3b786e29885c4227992dd289f9f") 09:14:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000200), 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={&(0x7f0000000000), 0x346, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYRES32], 0xffffffc4}}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 09:14:59 executing program 0: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) clock_getres(0x0, &(0x7f0000000400)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 09:14:59 executing program 5: unshare(0x28020400) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00'}, 0x10) 09:14:59 executing program 4: unshare(0x28020400) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x57, 0xc3, &(0x7f0000386000)=""/195}, 0x48) 09:14:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={&(0x7f0000000000), 0x346, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYRES32], 0xffffffc4}}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 09:15:00 executing program 5: unshare(0x28020400) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00'}, 0x10) 09:15:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x57, 0xc3, &(0x7f0000386000)=""/195}, 0x48) 09:15:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) accept4(r0, 0x0, &(0x7f0000000200), 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000), 0x346, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYRES32], 0xffffffc4}}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 09:15:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x57, 0xc3, &(0x7f0000386000)=""/195}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) 09:15:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x57, 0xc3, &(0x7f0000386000)=""/195}, 0x48) 09:15:00 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={@multicast1, @broadcast}, &(0x7f0000000480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@local, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000600)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000680)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000b40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000d00)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000e40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e80)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001280)={{{@in, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000001380)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'syzkaller1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001440)={{{@in=@multicast2, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000001540)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001580)={0x0, @loopback}, &(0x7f00000015c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000027c0)={0x0, @dev, @broadcast}, &(0x7f0000002800)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002bc0)={0x0, @multicast2, @dev}, &(0x7f0000002c00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002c40)={@multicast2, @rand_addr}, &(0x7f0000002c80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d80)={{{@in6=@remote, @in=@dev}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000002e80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f40)={@empty, @local}, &(0x7f0000002f80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002fc0)={{{@in=@broadcast, @in6=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f00000030c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000033c0)={@loopback}, &(0x7f0000003400)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289fb4b4") 09:15:00 executing program 3: creat(&(0x7f00000003c0)='./file0\x00', 0x0) clock_getres(0x0, &(0x7f0000000180)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() sigaltstack(&(0x7f0000ff6000/0x2000)=nil, &(0x7f0000000300)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xfffffffffffffffb) keyctl$assume_authority(0x10, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) delete_module(&(0x7f00000001c0)='/dev/full\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000088c0)={{{@in=@remote, @in6}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000089c0)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000008a00)=@xdp, &(0x7f0000008a80)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008ac0)={0x0, @broadcast, @remote}, &(0x7f0000008b00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008b40)={'bpq0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008b80)={0x0, @remote, @multicast2}, &(0x7f0000008bc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000b600)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b640)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f000000b740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b940)={{{@in=@dev, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f000000ba40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000ba80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000bac0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000bb00)={@remote}, &(0x7f000000bb40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bb80)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f000000bc80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bd80)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f000000be80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000bec0)={@broadcast, @multicast2}, &(0x7f000000bf00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f000000c000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000c040)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000c080)={{{@in=@local, @in=@remote}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000c180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000c280)={{{@in=@rand_addr, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f000000c380)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f000000c3c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000c400)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f000000ca80)={&(0x7f0000000280), 0xc, &(0x7f000000ca40)={&(0x7f000000c440)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) sendto$unix(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000500)=@file={0x0, './file1\x00'}, 0x6e) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000440), 0x1000000000000240, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000007c0)=0xe8) syz_execute_func(&(0x7f0000000340)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe09500000000c4027dbc8140af0000ee31a3b786e29885c4227992dd289f9f") 09:15:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x57, 0xc3, &(0x7f0000386000)=""/195}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) 09:15:00 executing program 0: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) clock_getres(0x0, &(0x7f0000000400)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 09:15:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000200), 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[]}}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 09:15:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000386000)=""/195}, 0x48) 09:15:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000002000), &(0x7f0000000080)='syzkaller\x00', 0x57, 0xc3, &(0x7f0000386000)=""/195}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) 09:15:00 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) open(&(0x7f0000000040)='./file0\x00', 0x400000, 0x0) fcntl$setstatus(r0, 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"79616d300001178b00", 0x4013}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={&(0x7f0000000040)}) 09:15:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000200), 0x0) sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[]}}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) [ 140.973962] ================================================================== [ 140.981411] BUG: KMSAN: kernel-infoleak in _copy_to_user+0x15d/0x1f0 [ 140.987935] CPU: 0 PID: 6280 Comm: syz-executor4 Not tainted 4.19.0-rc3+ #46 [ 140.995137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.004502] Call Trace: [ 141.007118] dump_stack+0x14b/0x190 [ 141.010783] kmsan_report+0x183/0x2b0 [ 141.014626] kmsan_internal_check_memory+0xfe/0x1f0 [ 141.019688] kmsan_copy_to_user+0x79/0xc0 [ 141.023864] _copy_to_user+0x15d/0x1f0 [ 141.027784] copy_siginfo_to_user+0x81/0x130 [ 141.032228] ptrace_request+0x2278/0x2680 [ 141.036410] ? __msan_poison_alloca+0x173/0x1f0 [ 141.041115] ? _raw_spin_lock_irqsave+0x41/0xe0 [ 141.045804] ? wait_task_inactive+0x397/0x990 [ 141.050331] ? kmsan_set_origin_inline+0x6b/0x120 [ 141.055251] arch_ptrace+0xbdd/0x11a0 [ 141.059087] ? ptrace_check_attach+0x182/0x5b0 [ 141.063701] __se_sys_ptrace+0x2a2/0x7e0 [ 141.067807] __x64_sys_ptrace+0x56/0x70 [ 141.071803] do_syscall_64+0xb8/0x100 [ 141.075625] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 141.080835] RIP: 0033:0x4572d9 [ 141.084056] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 141.102982] RSP: 002b:00007f6bb0501c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000065 [ 141.110722] RAX: ffffffffffffffda RBX: 00007f6bb05026d4 RCX: 00000000004572d9 [ 141.118011] RDX: 0000000020000004 RSI: 0000000000000001 RDI: 0000000000004209 [ 141.125298] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 141.132590] R10: 0000000020000100 R11: 0000000000000246 R12: 00000000ffffffff [ 141.139876] R13: 00000000004d4478 R14: 00000000004c8d0b R15: 0000000000000000 [ 141.147173] [ 141.148809] Local variable description: ----kiov@ptrace_request [ 141.154869] Variable was created at: [ 141.158610] ptrace_request+0x19f/0x2680 [ 141.162692] arch_ptrace+0xbdd/0x11a0 [ 141.166495] [ 141.168139] Bytes 0-15 of 128 are uninitialized [ 141.172820] Memory access starts at ffff8801b5d2fca0 [ 141.177931] ================================================================== [ 141.185290] Disabling lock debugging due to kernel taint [ 141.190750] Kernel panic - not syncing: panic_on_warn set ... [ 141.190750] [ 141.198142] CPU: 0 PID: 6280 Comm: syz-executor4 Tainted: G B 4.19.0-rc3+ #46 [ 141.206723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.216081] Call Trace: [ 141.218691] dump_stack+0x14b/0x190 [ 141.222358] panic+0x35d/0x8cb [ 141.225612] ? arch_ptrace+0xbdd/0x11a0 [ 141.229618] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 141.235106] kmsan_report+0x2a8/0x2b0 [ 141.238981] kmsan_internal_check_memory+0xfe/0x1f0 [ 141.244032] kmsan_copy_to_user+0x79/0xc0 [ 141.248210] _copy_to_user+0x15d/0x1f0 [ 141.252127] copy_siginfo_to_user+0x81/0x130 [ 141.256572] ptrace_request+0x2278/0x2680 [ 141.260745] ? __msan_poison_alloca+0x173/0x1f0 [ 141.265459] ? _raw_spin_lock_irqsave+0x41/0xe0 [ 141.270149] ? wait_task_inactive+0x397/0x990 [ 141.274675] ? kmsan_set_origin_inline+0x6b/0x120 [ 141.279571] arch_ptrace+0xbdd/0x11a0 [ 141.283889] ? ptrace_check_attach+0x182/0x5b0 [ 141.288504] __se_sys_ptrace+0x2a2/0x7e0 [ 141.292602] __x64_sys_ptrace+0x56/0x70 [ 141.296604] do_syscall_64+0xb8/0x100 [ 141.300432] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 141.305636] RIP: 0033:0x4572d9 [ 141.308855] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 141.327771] RSP: 002b:00007f6bb0501c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000065 [ 141.335501] RAX: ffffffffffffffda RBX: 00007f6bb05026d4 RCX: 00000000004572d9 [ 141.342780] RDX: 0000000020000004 RSI: 0000000000000001 RDI: 0000000000004209 [ 141.350093] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 141.357389] R10: 0000000020000100 R11: 0000000000000246 R12: 00000000ffffffff [ 141.364669] R13: 00000000004d4478 R14: 00000000004c8d0b R15: 0000000000000000 [ 141.372355] Kernel Offset: disabled [ 141.376005] Rebooting in 86400 seconds..